Malicious

Results: 683



#Item
11CS 294 – Secure Computation  February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-03-10 13:39:26
12Fastly & PerimeterX Protect your website from malicious bots with Fastly and PerimeterX Bot Defender The Fastly and PerimeterX value With malicious bot activity on the rise, and becoming more sophisticated,

Fastly & PerimeterX Protect your website from malicious bots with Fastly and PerimeterX Bot Defender The Fastly and PerimeterX value With malicious bot activity on the rise, and becoming more sophisticated,

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2017-05-05 00:21:22
13No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Oleksii Starov‡ , Johannes Dahse† , Syed Sharique Ahmad‡ , Thorsten Holz† , Nick Nikiforakis‡  ‡

No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Oleksii Starov‡ , Johannes Dahse† , Syed Sharique Ahmad‡ , Thorsten Holz† , Nick Nikiforakis‡ ‡

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 01:06:43
14Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Add to Reading List

Source URL: snap.stanford.edu

Language: English - Date: 2017-04-03 00:44:42
15Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Add to Reading List

Source URL: snap.stanford.edu

Language: English - Date: 2017-04-03 00:39:07
16A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority∗ Yehuda Lindell Ariel Nof

A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority∗ Yehuda Lindell Ariel Nof

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-07-24 06:20:42
    17DATASHEET  Prevent and Block Malicious Network Activity • Detect and pin-point network/traffic anomaly, take proactive action in real time. • Block access to sites associated with spyware, phishing and

    DATASHEET Prevent and Block Malicious Network Activity • Detect and pin-point network/traffic anomaly, take proactive action in real time. • Block access to sites associated with spyware, phishing and

    Add to Reading List

    Source URL: www.360.net

    Language: English - Date: 2017-11-29 02:00:35
      18Malicious Code on Java Card Smartcards: Attacks and Countermeasures Wojciech Mostowski and Erik Poll Digital Security (DS) group, Department of Computing Science Radboud University Nijmegen, The Netherlands {woj,erikpoll

      Malicious Code on Java Card Smartcards: Attacks and Countermeasures Wojciech Mostowski and Erik Poll Digital Security (DS) group, Department of Computing Science Radboud University Nijmegen, The Netherlands {woj,erikpoll

      Add to Reading List

      Source URL: ceres.hh.se

      Language: English - Date: 2015-05-16 14:49:15
        191  Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions  arXiv:1709.09577v1 [cs.CR] 27 Sep 2017

        1 Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions arXiv:1709.09577v1 [cs.CR] 27 Sep 2017

        Add to Reading List

        Source URL: arxiv.org

        Language: English - Date: 2017-09-27 20:59:06
        20Chapter 19: Malicious Logic • What is malicious logic • Types of malicious logic • Defenses  November 1, 2004

        Chapter 19: Malicious Logic • What is malicious logic • Types of malicious logic • Defenses November 1, 2004

        Add to Reading List

        Source URL: nob.cs.ucdavis.edu

        Language: English - Date: 2004-12-25 11:10:04