1![A Closer Look at MiniDuke A Closer Look at MiniDuke Authors Marius TIVADAR – Team Leader, Malware Research
A Closer Look at MiniDuke A Closer Look at MiniDuke Authors Marius TIVADAR – Team Leader, Malware Research](https://www.pdfsearch.io/img/ceb2c7d5bc2787be1e3dd1bb4785d7e2.jpg) | Add to Reading ListSource URL: labs.bitdefender.comLanguage: English - Date: 2017-05-03 10:46:10
|
---|
2![DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c](https://www.pdfsearch.io/img/e124ff0865859f9486f8e60b5e5313d9.jpg) | Add to Reading ListSource URL: people.cs.vt.eduLanguage: English - Date: 2018-04-09 14:09:44
|
---|
3![Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection of malware on websi Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection of malware on websi](https://www.pdfsearch.io/img/84c536a3367da5f1a176d403bb645063.jpg) | Add to Reading ListSource URL: www.cs.unm.edu- Date: 2011-01-29 14:01:59
|
---|
4![RiskIQ Research: Compromised eCommerce Sites Lead to Web-Based Keyloggers Most methods used by attackers to target consumers are commonplace, such as phishing and the use of malware to target payment cards. Others, such RiskIQ Research: Compromised eCommerce Sites Lead to Web-Based Keyloggers Most methods used by attackers to target consumers are commonplace, such as phishing and the use of malware to target payment cards. Others, such](https://www.pdfsearch.io/img/3c3e492ca69edef5a80fb233a879e3a4.jpg) | Add to Reading ListSource URL: safe.riskiq.com- Date: 2016-12-29 14:59:46
|
---|
5![Research How to interpret networkbased malware detection The impact of malware acquisition and processing on network detection and threat classification systems By Günter Ollmann Research How to interpret networkbased malware detection The impact of malware acquisition and processing on network detection and threat classification systems By Günter Ollmann](https://www.pdfsearch.io/img/3acb6a3868159e9f2e6298f991c2ddeb.jpg) | Add to Reading ListSource URL: www.vectranetworks.com- Date: 2016-07-08 13:34:24
|
---|
6![MADAM: A Multi Level Anomaly Detector for Android Malware Fabio Martinelli National Research Council of Italy (CNR) Joint work with Andrea Saracino, Daniele Sgandurra et al. MADAM: A Multi Level Anomaly Detector for Android Malware Fabio Martinelli National Research Council of Italy (CNR) Joint work with Andrea Saracino, Daniele Sgandurra et al.](https://www.pdfsearch.io/img/45db7bca67f52e2000d6acb6dccb27c6.jpg) | Add to Reading ListSource URL: comsec.spb.ru- Date: 2015-12-03 06:47:11
|
---|
7![Research Brief June 2014 The Citizen Lab Police Story: Hacking Team’s Government Surveillance Malware Research Brief June 2014 The Citizen Lab Police Story: Hacking Team’s Government Surveillance Malware](https://www.pdfsearch.io/img/d5484e32003ae19c52d6faea46f7682c.jpg) | Add to Reading ListSource URL: citizenlab.org- Date: 2015-03-18 14:57:42
|
---|
8![Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware Tudor Dumitras, Symantec Research Labs Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware Tudor Dumitras, Symantec Research Labs](https://www.pdfsearch.io/img/872295078745ac7688d28943e1a43ed2.jpg) | Add to Reading ListSource URL: static.usenix.org- Date: 2011-07-08 13:42:23
|
---|
9![Operation Liberpy’: Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab – version 1.1 Operation Liberpy’: Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab – version 1.1](https://www.pdfsearch.io/img/110f5e65fb08a49d513a307ca59cf3e8.jpg) | Add to Reading ListSource URL: www.welivesecurity.com- Date: 2015-07-10 11:30:34
|
---|
10![Press Release Embedded Software Security Solutions to Ride Rising Tide of Internet of Things, According to VDC Research Ubiquitous connectivity will drive 26% annual revenue growth for vendors to help thwart malware and Press Release Embedded Software Security Solutions to Ride Rising Tide of Internet of Things, According to VDC Research Ubiquitous connectivity will drive 26% annual revenue growth for vendors to help thwart malware and](https://www.pdfsearch.io/img/222f56f6a245fb3c9c54f0ce68dfab7d.jpg) | Add to Reading ListSource URL: www.vdcresearch.comLanguage: English - Date: 2016-02-01 13:56:30
|
---|