<--- Back to Details
First PageDocument Content
Computer security / Antivirus software / Client honeypot / Malware / Rogue software / Gumblar / HoneyMonkey / JavaScript / World Wide Web / Computing / Computer network security / Cyberwarfare
Date: 2015-05-25 21:19:32
Computer security
Antivirus software
Client honeypot
Malware
Rogue software
Gumblar
HoneyMonkey
JavaScript
World Wide Web
Computing
Computer network security
Cyberwarfare

BadSignal-Reputation-bar.eps

Add to Reading List

Source URL: people.csail.mit.edu

Download Document from Source Website

File Size: 284,99 KB

Share Document on Facebook

Similar Documents

Crime prevention / Cryptography / Information governance / National security / Computer network security / Digital mailroom / Computer security / Server / F-Secure / FTPS / Client honeypot

OVEANA Global Business Services 123 W. Mills Avenue, Suite 400 El Paso, TXDigital Imaging Servicing Level

DocID: 1pjnK - View Document

Computing / Cyberwarfare / Computer network security / Computer security / Cybercrime / Spamming / Internet security / Zero-day / Phishing / Computer virus / Syslog / Client honeypot

Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6

DocID: 1nul6 - View Document

Information science / Information retrieval / URL redirection / Cloaking / Malware / JavaScript / Client honeypot / Cross-site scripting / World Wide Web / Computing / Uniform resource locator / Internet

Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.edu

DocID: 1b1Ew - View Document

Computer security / Antivirus software / Client honeypot / Malware / Rogue software / Gumblar / HoneyMonkey / JavaScript / World Wide Web / Computing / Computer network security / Cyberwarfare

BadSignal-Reputation-bar.eps

DocID: 1aS6A - View Document

Internet / URI schemes / Malware / JavaScript / Webalizer / Client honeypot / World Wide Web / HTTP referer / Spyware / Computing / Espionage / Uniform resource locator

Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,

DocID: 19Zw7 - View Document