Malware

Results: 7286



#Item
941Cryptography / Cyberwarfare / Malware / Malware analysis / Encryption / Rootkit / HTTPS / Botnet / Block cipher / Advanced Encryption Standard / Cipher / Draft:Energy related security attacks

Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

Add to Reading List

Source URL: www.kutter-fonds.ethz.ch

Language: English - Date: 2010-05-16 10:46:32
942

Powerful anti-malware defense Because your current antivirus solution alone can’t protect your network As cyber attacks increase in frequency and sophistication, IT managers are starting to realize that relying on onl

Add to Reading List

Source URL: pl.malwarebytes.org

Language: English
    943

    TOTAL SECURITY 2016 Best Protection. Best Performance. Easy to Use. Bitdefender Total Security 2016 is the ultimate anti-malware software today. It builds on technology awarded PRODUCT OF THE YEAR(1) and uses machine-lea

    Add to Reading List

    Source URL: download.bitdefender.com

    Language: English - Date: 2015-08-26 11:22:04
      944

      D REBIN: Effective and Explainable Detection of Android Malware in Your Pocket Daniel Arp1 , Michael Spreitzenbarth2 , Malte H¨ubner1 , Hugo Gascon1 , Konrad Rieck1 1 University of G¨ottingen

      Add to Reading List

      Source URL: user.informatik.uni-goettingen.de

      Language: English - Date: 2015-02-14 07:53:33
        945

        Concordia: A Google for Malware Timothy Daly Luanne Burns Software Engineering Institute

        Add to Reading List

        Source URL: daly.axiom-developer.org

        Language: English - Date: 2011-03-02 22:04:22
          946

          Powerful multi-layered defense delivers smart endpoint protection. Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one pow

          Add to Reading List

          Source URL: br.malwarebytes.org

          Language: English
            947

            Kopis:  Detec,ng  Malware  Domains   at  the  Upper  DNS  Hierarchy   Manos  Antonakakis     Damballa  Inc.   Georgia  Ins2tute  of  Technology,  College  of  C

            Add to Reading List

            Source URL: astrolavos.gatech.edu

            Language: English - Date: 2016-01-27 10:57:12
              948Computing / Cyberspace / Spamming / Internet / Cybercrime / Computer virus / Deception / Internet security / Email spam / Malware / Anti-spam techniques / Email

              Research Brief October 2013 The Citizen Lab Targeted Threats Index

              Add to Reading List

              Source URL: citizenlab.org

              Language: English - Date: 2015-03-18 14:57:46
              949

              Detecting Targeted Smartphone Malware with Behaviour-Triggering Stochastic Models Authors: Guillermo Suarez-Tangil* Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez *COmputer SEcurity (COSEC) Lab Computer Department —

              Add to Reading List

              Source URL: esorics2014.pwr.wroc.pl

              Language: English - Date: 2016-02-02 07:14:00
                950

                Malware Threat Defender Uitdaging financiële wereld Bedrijven in de financiële dienstverlening blijven kwetsbaar ten aanzien van datalekken en cybercrime De bedreigingen van computercriminaliteit lijken overal op de l

                Add to Reading List

                Source URL: www.redsocks.nl

                Language: Dutch - Date: 2016-01-25 04:02:34
                  UPDATE