Search

Your search keyword '"malware"' showing total 52 results

Search Constraints

Start Over You searched for: Descriptor "malware" Remove constraint Descriptor: "malware" Publication Type Books Remove constraint Publication Type: Books
52 results on '"malware"'

Search Results

1. Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

2. Establishing a computer security incident response capability (CSIRC)

5. Mobile Botnet Attacks: A Thematic Taxonomy.

6. On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.

7. Classifying Android Malware through Subgraph Mining.

8. Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation.

9. Detecting Malwares in Honeynet Using a Multi-agent System.

10. Bait Your Hook: A Novel Detection Technique for Keyloggers.

11. Mobile Botnet Detection Using Network Forensics.

12. Behavior Abstraction in Malware Analysis.

13. Applying Behavioral Detection on Android-Based Devices.

14. DeCore: Detecting Content Repurposing Attacks on Clients΄ Systems.

15. MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology.

16. CHAPTER 2: Computer Viruses: Are You at Risk?

17. CHAPTER 1: Malware: A Comprehensive Introduction.

18. Hardening Botnet by a Rational Botmaster.

19. A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.

20. Scada Malware, a Proof of Concept.

21. A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation.

22. A Case Study on Asprox Infection Dynamics.

23. How Good Are Malware Detectors at Remediating Infected Systems?

24. Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack.

25. Mitigating Drive-By Download Attacks: Challenges and Open Problems.

26. Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.

27. A Layered Architecture for Detecting Malicious Behaviors.

28. Dynamic Binary Instrumentation-Based Framework for Malware Defense.

29. Malicious Beacon Detection for Localization in Wireless Sensor Networks.

30. Das materielle Computerstrafrecht

31. Unauthorized Access

33. Worm.

34. Zoo.

35. Virus.

36. Trojan.

37. Signature Detection.

38. Script Vulnerability.

39. Program Infector.

40. Malware.

41. Malicious Code.

42. Knark.

43. Hijackware.

44. European Institute of Computer Anti-Virus Research.

45. Browser Hijacker.

46. Boot Record Infector.

47. Behavior Blocking Software.

48. Arbitrary Code Execution Attack.

49. Anti-Adware.

50. Amplification Attack.

Catalog

Books, media, physical & digital resources