Malicious

Results: 683



#Item
211

Ryzykowny Interes: Zagrożenie ze strony złośliwych aplikacji w nielicencjonowanym oprogramowaniu malicious + software = malware WIRUSY KO

Add to Reading List

Source URL: globalstudy.bsa.org

Language: Polish - Date: 2015-02-24 10:16:17
    212

    Automatically Detecting Vulnerable Sites Before They Turn Malicious Kyle  Soska   Carnegie  Mellon  University   ECE  /  Cylab    

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2014-08-27 19:15:57
      213

      PDF 101 The PDF way of security Thinking malicious PDF Darth Origami: dark side of PDF Last words

      Add to Reading List

      Source URL: www.security-labs.org

      Language: English - Date: 2013-07-29 06:55:43
        214

        Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model Adriana C. B. Pinto∗ Rafael Dowsley†

        Add to Reading List

        Source URL: imi.kyushu-u.ac.jp

        Language: English - Date: 2009-12-02 23:10:12
          215

          1 User-Centric Dependence Analysis For Identifying Malicious Mobile Apps Karim Elish, Danfeng (Daphne) Yao, Barbara G. Ryder Department of Computer Science

          Add to Reading List

          Source URL: www.mostconf.org

          Language: English - Date: 2012-05-26 19:38:20
            216

            Risky Business: Malware Threats From Unlicensed Software malicious + software = malware ES OJAN HORS VIRUSES

            Add to Reading List

            Source URL: globalstudy.bsa.org

            Language: English - Date: 2015-02-24 10:16:11
              217

              Uncovering the Footprints of Malicious Traffic in Cellular Data Networks Arun Raghuramu1 , Hui Zang2 , and Chen-Nee Chuah3 1 3

              Add to Reading List

              Source URL: rubinet.ece.ucdavis.edu

              Language: English - Date: 2015-02-23 18:06:54
                218

                Rizično poslovanje: opasnosti od nelicenciranog softvera malicious + software = malware (maliciozni softver) SPYWARE

                Add to Reading List

                Source URL: globalstudy.bsa.org

                Language: Croatian - Date: 2015-03-11 09:59:58
                  219Information science / Information retrieval / URL redirection / Cloaking / Malware / JavaScript / Client honeypot / Cross-site scripting / World Wide Web / Computing / Uniform resource locator / Internet

                  Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.edu

                  Add to Reading List

                  Source URL: www0.cs.ucl.ac.uk

                  Language: English - Date: 2014-09-02 09:17:33
                  220Hypodermic needle / Wound / Port / Medicine / Medical equipment / Needlestick injury

                  HSE Alert 182 Needlestick injuries Background Tube Lines has been made aware by DLR of a malicious incident which occurred recently on a railway work site where a hypodermic needle was attached to the inside of a site we

                  Add to Reading List

                  Source URL: www.tubelines.com

                  Language: English - Date: 2013-10-03 10:53:46
                  UPDATE