21![CHAPTER 1 INTRODUCTION 1.1 CHAPTER 1 INTRODUCTION 1.1](https://www.pdfsearch.io/img/dec2b98fc87796ae716d743081d42a55.jpg) | Add to Reading ListSource URL: eprints.utm.myLanguage: English - Date: 2012-07-03 03:57:07
|
---|
22![Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2 Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2](https://www.pdfsearch.io/img/efe117234d621e9e0be77d2732e198d9.jpg) | Add to Reading ListSource URL: www.isoc.orgLanguage: English - Date: 2008-01-28 08:33:00
|
---|
23![:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. :: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.](https://www.pdfsearch.io/img/36082e6aa43057dfdb5ee9f72b826825.jpg) | Add to Reading ListSource URL: www.eset.comLanguage: English - Date: 2011-02-28 17:14:03
|
---|
24![The Evolving Virus Threat Mr. Carey Nachenberg Chief Researcher, Symantec Corporation Over the past twenty years, computer viruses have evolved from simple computer programs capable of spreading on a single PC to complex The Evolving Virus Threat Mr. Carey Nachenberg Chief Researcher, Symantec Corporation Over the past twenty years, computer viruses have evolved from simple computer programs capable of spreading on a single PC to complex](https://www.pdfsearch.io/img/b781c4e01bae440686c038fe5a9859fd.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2000-11-03 00:00:00
|
---|
25![11310863_HTTST_tb.qxd[removed]:03 PM 11310863_HTTST_tb.qxd[removed]:03 PM](https://www.pdfsearch.io/img/e31949f6a3a714e48a56ba84a759d99c.jpg) | Add to Reading ListSource URL: www.symantec.comLanguage: English - Date: 2006-10-31 19:47:03
|
---|
26![](https://www.pdfsearch.io/img/ffba57361e8dfe276727103389fa12e8.jpg) | Add to Reading ListSource URL: cs.unc.eduLanguage: English - Date: 2009-10-28 10:35:48
|
---|
27![Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose](https://www.pdfsearch.io/img/1f618d2a39139be0267a244340112772.jpg) | Add to Reading ListSource URL: cs.unc.eduLanguage: English - Date: 2012-08-20 18:04:07
|
---|
28![J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation](https://www.pdfsearch.io/img/36efcca97439ec1ab90ce69355c7cf71.jpg) | Add to Reading ListSource URL: cs.unc.eduLanguage: English - Date: 2009-10-19 10:25:58
|
---|
29![STRIDE: POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE ANALYSIS P. Akritidis1, E. P. Markatos1, M. Polychronakis1, and K. Anagnostakis2 1 STRIDE: POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE ANALYSIS P. Akritidis1, E. P. Markatos1, M. Polychronakis1, and K. Anagnostakis2 1](https://www.pdfsearch.io/img/e2d951f7c8ccc799a37e438cd8292abc.jpg) | Add to Reading ListSource URL: cs.unc.eduLanguage: English - Date: 2009-10-19 10:45:13
|
---|
30![Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection](https://www.pdfsearch.io/img/c428bb614a7a4217fd35b0494859d773.jpg) | Add to Reading ListSource URL: www.emis.deLanguage: English - Date: 2010-07-18 14:17:42
|
---|