<--- Back to Details
First PageDocument Content
Computer network security / Computer security / Antivirus software / Rootkit / Computer virus / Computer worm / Threat / Conficker / Botnet / System software / Malware / Cyberwarfare
Date: 2010-10-14 13:37:00
Computer network security
Computer security
Antivirus software
Rootkit
Computer virus
Computer worm
Threat
Conficker
Botnet
System software
Malware
Cyberwarfare

Malware Attribute Enumeration and Characterization Ivan Kirillov Penny Chase MITRE Corporation

Add to Reading List

Source URL: maec.mitre.org

Download Document from Source Website

File Size: 1,47 MB

Share Document on Facebook

Similar Documents

Why is Vipre not removing Conficker / Kido / Downadup

Why is Vipre not removing Conficker / Kido / Downadup

DocID: 1uMrl - View Document

T H E H O N E Y N E T P R O J E C T ® | KYE Paper  Know Your Enemy: Containing Conficker To Tame A Malware The Honeynet Project http://honeynet.org

T H E H O N E Y N E T P R O J E C T ® | KYE Paper Know Your Enemy: Containing Conficker To Tame A Malware The Honeynet Project http://honeynet.org

DocID: 1u2oB - View Document

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

DocID: 1osj7 - View Document

Conficker and Beyond: A Large-Scale Empirical Study Seungwon Shin and Guofei Gu SUCCESS LAB Texas A&M University

Conficker and Beyond: A Large-Scale Empirical Study Seungwon Shin and Guofei Gu SUCCESS LAB Texas A&M University

DocID: 1lQAQ - View Document

conficker_jrnl_final_doublecol.pdf

conficker_jrnl_final_doublecol.pdf

DocID: 1lMDd - View Document