TorBT - Torrents and Magnet Links Search Engine
Malware book collection 1
- Date: 2022-04-21
- Size: 625 MB
- Files: 682
File Name
Size
Computer viruses - a high-tech desease.pdf
85 MB
Malicious Cryptography - Exposing Cryptovirology.pdf
29 MB
Malware Forensics Investigating and Analyzing Malicious Code.pdf
25 MB
Computer Virus Survival Guide.pdf
25 MB
Malware_ Von Viren, W+-rmern, Hackern und Trojanern und wie man sich vor ihnen sch+-tzt.pdf
22 MB
Les virus informatiques_ th+йorie, pratique et applications.pdf
20 MB
Malware Detection.pdf
18 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf
14 MB
Computer Viruses and Malware.pdf
11 MB
PC Magazine Fighting Spyware Viruses and Malware.pdf
10 MB
Crimeware_ Understanding New Attacks and Defenses.chm
10 MB
Malware Analyst's Cookbook and DVD.pdf
8.9 MB
Mobile Malware Attacks and Defense.pdf
6.7 MB
Malware_ Fighting Malicious Code.chm
6.3 MB
Identifying Malicious Code Through Reverse Engineering.pdf
6.2 MB
On self-reproducing computer programs.pdf
6.2 MB
Disk-Level Behavioral Virus Detection.pdf
5.5 MB
Cryptography_ all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf
4.7 MB
COMPUTE!'s computer viruses.pdf
4.6 MB
Computer virus immunization.pdf
4.5 MB
I.T. IN PRACTICE_ Computer viruses.pdf
4.3 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 .pdf
4.3 MB
Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf
3.8 MB
Malicious crypto - (Ab)use cryptology.pdf
3.8 MB
Dynamical Models for Computer Viruses Propagation.pdf
3.8 MB
Malicious crypto.pdf
3.8 MB
Computer Viruses, Artificial Life and Evolution.pdf
3.8 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings.pdf
3.8 MB
Computer Viruses and Other Malicious Software_ A Threat to the Internet Economy.pdf
3.7 MB
Computer Viruses and the Simulation Environment WiCE.pdf
3.6 MB
Formal Models of Reproduction_ from Computer Viruses to Artificial Life.pdf
3.2 MB
Applied parallel coordinates for logs and network traffic attack analysis.pdf
2.9 MB
Defense and Detection Strategies against Internet Worms.pdf
2.9 MB
Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings.pdf
2.8 MB
A Framework for Deception.pdf
2.7 MB
Computer Viruses for Dummies.pdf
2.6 MB
In-depth analysis of the viral threats with OpenOf#ce.org documents.pdf
2.6 MB
Flying below the Radar_ What modern malware tells us.pdf
2.4 MB
A method to detect metamorphic computer viruses.pdf
2.4 MB
Computer viruses (BMJ 296-013).pdf
2.3 MB
Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf
2.2 MB
MCF_ a malicious code filter.pdf
2.2 MB
Peer-to-Peer Botnets_ Analysis and Detection.pdf
2.2 MB
Macro virus identification problems.pdf
2.1 MB
Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings.pdf
2.0 MB
Approaching Zero - The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals.pdf
2.0 MB
Classification and identification of malicious code based on heuristic techniques utilizing Meta languages.pdf
2.0 MB
Internet Instability and Disturbance_ Goal or Menace_.pdf
1.9 MB
Computer viruses_ from theory to applications.pdf
1.9 MB
On Callgraphs and Generative Mechanisms.pdf
1.8 MB
Malicious origami in PDF.pdf
1.8 MB
Automatic binary deobfuscation.pdf
1.8 MB
Comparative analysis of various ransomware virii.pdf
1.7 MB
Mechanics of Self-reproduction.pdf
1.7 MB
Impeding Malware Analysis Using Conditional Code Obfuscation.pdf
1.6 MB
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf
1.5 MB
Experience with Viruses on UNIX Systems.pdf
1.5 MB
ACPI and SMI handlers_ some limits to trusted computing.pdf
1.4 MB
An Approach towards Disassembly of Malicious Binary Executables.pdf
1.4 MB
IPA Computer Virus Survey 2000.pdf
1.4 MB
Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses.pdf
1.4 MB
Darwin inside the machines_ Malware evolution and the consequences for computer security.pdf
1.4 MB
Automatic Reverse Engineering of Malware Emulators.pdf
1.4 MB
Computational Aspects of Computer Viruses.pdf
1.4 MB
Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf
1.3 MB
Computer Viruses - Theory and Experiments.pdf
1.3 MB
Detecting Unknown Computer Viruses.pdf
1.3 MB
A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf
1.3 MB
Detecting Viral Propagations Using Email Behavior Profiles.pdf
1.3 MB
A History Of Computer Viruses - The Famous `Trio'.pdf
1.3 MB
Notes on the _Worms_ programs -- some early experience with a distributed computation.pdf
1.3 MB
Polymorphic and Metamorphic Malware Detection.pdf
1.3 MB
Design of a neural network for recognition and classification of computer viruses.pdf
1.2 MB
Identification of file infecting viruses through detection of self-reference replication.pdf
1.2 MB
On Effectiveness of Defense Systems against Active Worms.pdf
1.2 MB
Defending against Viruses and Worms.pdf
1.2 MB
IpMorph_ fingerprinting spoofing unification.pdf
1.2 MB
Measuring and Modeling Computer Virus Prevalence.pdf
1.2 MB
Hunting for undetectable metamorphic viruses.pdf
1.2 MB
A Study of Malcode-Bearing Documents.pdf
1.1 MB
Cryptovirology_ Extortion-Based Security Threats and Countermeasures.pdf
1.1 MB
Crisis and Aftermath.pdf
1.1 MB
A Formal Definition of Computer Worms and Some Related Results.pdf
1.1 MB
Callgraph properties of executables.pdf
1.1 MB
Model for network behaviour under viral attack.pdf
1.1 MB
Disk-Level Behavioral Malware Detection.pdf
1.1 MB
Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf
1.1 MB
Detecting Sources of Computer Viruses in Networks_ Theory and Experiment.pdf
1.1 MB
ExaminingTаViruses.pdf
1.1 MB
Functional polymorphic engines_ formalisation, implementation and use cases.pdf
1.0 MB
Metamorphic Virus_ Analysis and Detection.pdf
1.0 MB
Can you be held civilly liable for spreading computer viruses_.pdf
1.0 MB
An Approach to Containing Computer Viruses.pdf
1.0 MB
A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed.pdf
1.0 MB
Implementation of a Computer Immune System for Intrusion- and Virus Detection.pdf
1.0 MB
Computer viruses demystified.pdf
995 kB
Non-signature based virus detection.pdf
992 kB
Hunting for Metamorphic Engines.pdf
990 kB
Computer Viruses and Ethics.pdf
982 kB
Development of inland lakes as hubs in an invasion network.pdf
972 kB
Metaphors and Modern Threats_ Biological, Computer, and Cognitive Viruses.pdf
962 kB
Are current antivirus programs able to detect complex metamorphic malware_ An empirical evaluation.pdf
941 kB
Free Anti-Virus Tips and Techniques.pdf
940 kB
Analysis and detection of metamorphic computer viruses.pdf
932 kB
Code obfuscation and virus detection.pdf
930 kB
Biological versus Computer Viruses.pdf
912 kB
Hunting For Metamorphic.pdf
902 kB
Malware behaviour analysis.pdf
899 kB
Anti-Malware Tools_ Intrusion Detection Systems.pdf
893 kB
Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf
890 kB
Panic computing_ The viral metaphor and computer technology.pdf
876 kB
Fileprint analysis for Malware Detection.pdf
850 kB
Concepts and Future Trends in Computer Virology.pdf
841 kB
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf
833 kB
Epidemiological Modelling of Peer-to-Peer Viruses and Pollution.pdf
828 kB
Computer Virus Operation and New Directions-1997.pdf
820 kB
Fragmented malware through RFID and its defenses.pdf
816 kB
Analysis of rxbot.pdf
816 kB
Honeypots against Worms 101.pdf
809 kB
A History Of Computer Viruses_ Three Special Viruses.pdf
790 kB
Modeling Malware Spreading Dynamics.pdf
790 kB
Detecting Kernel-Level Rootkits Through Binary Analysis.pdf
788 kB
Morphological Detection of Malware.pdf
787 kB
Hunting for metamorphic engines 2.pdf
787 kB
Architecture of a Morphological Malware Detector.pdf
787 kB
Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses v2.pdf
781 kB
Collaborative Defense Against Zero-Day and Polymorphic Worms_ Detection, Response and an Evaluation Framework.pdf
769 kB
Measuring virtual machine detection in malware using DSD tracer.pdf
764 kB
Computer virus prevention and containment on mainframes.pdf
763 kB
Code obfuscation techniques for metamorphic viruses.pdf
761 kB
IMAD_ In-Execution Malware Analysis and Detection.pdf
751 kB
A Short Visit to the Bot Zoo.pdf
742 kB
Immune System for Virus Detection and Elimination.pdf
740 kB
An Abstract Theory of Computer Viruses.pdf
730 kB
Code mutation techniques by means of formal grammars and automatons.pdf
729 kB
Computer Virus Propagation Model Based on Variable Propagation Rate.pdf
727 kB
Database Rootkits.pdf
721 kB
Computer _virus_ identification by neural networks.pdf
716 kB
A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS.pdf
715 kB
A Public Health Approach to Preventing Malware Propagation.pdf
708 kB
Know Your Enemy_ Containing Conficker.pdf
700 kB
Detecting Malicious Code by Model Checking.pdf
700 kB
A fault tolerance approach to computer viruses.pdf
680 kB
Botnetsand Applications.pdf
678 kB
Modeling the Effects of Timing Parameters on Virus Propagation.pdf
678 kB
New data mining technique to enhance IDS alarms quality.pdf
672 kB
Computer viruses (BMJ 307-59e).pdf
664 kB
A Proposed Taxonomy of Software Weapons.pdf
657 kB
Analysis and Detection of Computer Viruses and Worms.pdf
652 kB
Cobra_ Fine-grained Malware Analysis using Stealth Localized-executions.pdf
649 kB
Developing a Trojan applets in a smart card.pdf
640 kB
IDS alerts correlation using grammar-based approach.pdf
640 kB
Modeling the Spread of Active Worms.pdf
632 kB
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf
630 kB
Computer Viruses_ The Technology and Evolution of an Artificial Life Form.pdf
630 kB
Automatic Extraction of Computer Virus Signatures.pdf
622 kB
Automated Web Patrol with Strider HoneyMonkeys_ Finding Web Sites That Exploit Browser Vulnerabilities.pdf
618 kB
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques.pdf
607 kB
Applications of Immune System Computing.pdf
606 kB
Characterization of virus replication.pdf
599 kB
Anti-Forensics_ The Rootkit Connection.pdf
596 kB
Modeling Computer Viruses.pdf
596 kB
Computer Viruses, Epidemiology, and Worms.pdf
595 kB
Distributed Worm Simulation with a Realistic Internet Model.pdf
593 kB
Distributed Computing with a Trojan Horse.pdf
590 kB
Analysis of Web Application Worms and Viruses.pdf
589 kB
Auto-Sign_ an automatic signature generator for high-speed malware filtering devices.pdf
586 kB
Computer Virus Operation and New Directions.pdf
582 kB
Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf
581 kB
Polymorphic virus detection technology.pdf
580 kB
Fast virus detection by using high speed time delay neural networks.pdf
579 kB
Abstraction-Based Intrusion Detection In Distributed Environments.pdf
577 kB
Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf
574 kB
Modeling Epidemic Spreading in Mobile Environments.pdf
574 kB
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques.pdf
570 kB
Internet - Virusnet_.pdf
569 kB
End-to-end security implementation for mobile devices using TLS protocol.pdf
568 kB
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware.pdf
568 kB
Geometry-based flash worm detection.pdf
567 kB
Evolvable Malware.pdf
567 kB
A Generic Virus Detection Agent on the Internet.pdf
560 kB
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses.pdf
558 kB
Detecting metamorphic viruses using profile hidden markov models.pdf
548 kB
Automated Worm Fingerprinting.pdf
547 kB
Architecture of a morphological malware detector v2.pdf
537 kB
Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf
536 kB
Advanced Polymorphic Techniques.pdf
532 kB
Modeling Botnet Propagation Using Time Zones.pdf
528 kB
A Distributed Approach against Computer Viruses Inspired by the Immune System.pdf
509 kB
Advanced fuzzing in the VoIP space.pdf
504 kB
Ethereal,TаunTаanalyseurTаr+й seauTа+а usagesTаmultiples.pdf
499 kB
Malware Detection Based on Suspicious Behavior Identification.pdf
492 kB
E-mail virus protection handbook.pdf
492 kB
Automated Classification and Analysis of Internet Malware.pdf
489 kB
On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf
487 kB
Password Cracking_ A Game of Wits.pdf
477 kB
Malware, Viruses and Log Visualisation.pdf
474 kB
Combinatorial Optimisation of Worm Propagation on an Unknown Network.pdf
466 kB
PE-Miner_ Mining Structural Information to Detect Malicious Executables in Realtime.pdf
464 kB
Defeating Polymorphism_ Beyond Emulation.pdf
459 kB
EPOCalypse NOW!.pdf
456 kB
How Viruses Spread among Computers and People.pdf
452 kB
Computer Viruses_ the Inevitability of Evolution_.pdf
451 kB
A Virtual Honeypot Framework.pdf
451 kB
Computer Immunology.pdf
450 kB
How dumaru_.pdf
449 kB
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf
448 kB
Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems.pdf
446 kB
Is virus writing really that bad_.pdf
445 kB
Improving Malware Detection by Applying Multi-Inducer Ensemble.pdf
442 kB
Computer Viruses, Epidemiology and Worms v2.pdf
440 kB
Efficient Virus Detection Using Dynamic Instruction Sequences.pdf
438 kB
Opcodes as Predictor for Malware.pdf
437 kB
On JavaScript Malware and related threats.pdf
436 kB
First Virus_.pdf
436 kB
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf
433 kB
A theoretical model of differential social attributions toward computing technology_ when the metaphor becomes the model.pdf
425 kB
Modern operating systems.pdf
425 kB
A bit of viral protection is worth a megabyte of cure.pdf
417 kB
Inside the Slammer Worm.pdf
415 kB
Attack of the quantum worms.pdf
410 kB
API Win32 ancestrales pour Chevaux de Troie hyper furtifs.pdf
408 kB
A general definition of malware.pdf
407 kB
An Overview of Unix Rootkits.pdf
403 kB
High-Fidelity Modeling of Computer Network Worms.pdf
400 kB
A Mathematical Theory for the Spread of Computer Viruses.pdf
400 kB
Computer Viruses By Ingrid Richter.pdf
399 kB
Analysis of a scanning model of worm propagation.pdf
398 kB
Hidden Rootkits in Windows.pdf
397 kB
Malicious Software in Mobile Devices.pdf
395 kB
ARTIST_ A Network for ARTifical Immune SysTems.pdf
391 kB
Loathing Lupper in Linux.pdf
389 kB
Mimimorphism_ A New Approach to Binary Code Obfuscation.pdf
387 kB
Malware pattern scanning schemes secure against black-box analysis.pdf
385 kB
Inoculating SSH Against Address-Harvesting Worms.pdf
380 kB
Formalisation and implementation aspects of K -ary (malicious) codes.pdf
380 kB
Metaphors And Meta-Experiences In Technology Side Effects_ A Multimedia Exhibit.pdf
380 kB
A software authentication system for the prevention of computer viruses.pdf
379 kB
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection.pdf
377 kB
A parallel _String Matching Engine_ for use in high speed network intrusion detection systems.pdf
375 kB
Implementing and Detecting an ACPI BIOS Rootkit.pdf
373 kB
A History Of Computer Viruses - Introduction.pdf
373 kB
On the possibility of practically obfuscating programs.pdf
373 kB
Computer viruses_ a quantitative analysis.pdf
372 kB
Danger theory and collaborative filtering in MANETs.pdf
372 kB
Misleading Modern Malware.pdf
370 kB
Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf
369 kB
Fighting EPO Viruses.pdf
369 kB
Malicious Software.pdf
360 kB
Email Virus Propagation Modeling and Analysis.pdf
359 kB
Detection of New Malicious Code Using N-grams Signatures.pdf
358 kB
Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf
357 kB
Effectiveness of Quarantine in Worm Epidemics.pdf
355 kB
Challenges Of Modeling BotNets For Military And Security Simulations.pdf
354 kB
Mathematical models on computer viruses.pdf
354 kB
Concepts of cooperation in artificial life.pdf
353 kB
Host-Based Detection of Worms through Peer-to-Peer Cooperation.pdf
352 kB
Old Win32 Code for a Modern Super-stealth Trojan.pdf
352 kB
Computer Viruses on the Loose.pdf
349 kB
Computer Virus Myths.pdf
347 kB
Control Flow to Detect Malware.pdf
345 kB
Introducing Stealth Malware Taxonomy.pdf
344 kB
A Semantics-Based Approach to Malware Detection.pdf
344 kB
Computer viruses (BMJ 299-66a).pdf
344 kB
A Retrovirus Inspired Algorithm for Virus Detection & Optimization.pdf
343 kB
Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf
343 kB
Are Metamorphic Viruses Really Invincible_.pdf
343 kB
Artificial Immune System against Viral Attack.pdf
342 kB
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations.pdf
338 kB
On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf
335 kB
Impact of Computer Viruses on Society.pdf
333 kB
Code-Red_ a case study on the spread and victims of an Internet worm.pdf
328 kB
Computer Immunology(Lau).pdf
327 kB
Detecting Stealth Software with Strider GhostBuster.pdf
324 kB
Formal Affordance-based Models of Computer Virus Reproduction.pdf
322 kB
A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows.pdf
320 kB
Model-Based Analysis of Two Fighting Worms.pdf
320 kB
Generic Detection and Classification of Polymorphic Malware Using Neural Pattern Recognition.pdf
318 kB
Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf
318 kB
On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf
312 kB
Malware Normalization.pdf
312 kB
Advanced Metamorphic Techniques in Computer Viruses.pdf
311 kB
A Framework to Detect Novel Computer Viruses via System Calls.pdf
311 kB
A Theoretical Superworm.pdf
310 kB
Computer Virus-Antivirus Coevolution.pdf
310 kB
Evaluation of malware phylogeny modelling systems using automated variant generation.pdf
309 kB
Detecting Worms through Cryptographic Hashes.pdf
308 kB
Anatomy of a Semantic Virus.pdf
306 kB
A Self-reproducing Analogue.pdf
304 kB
Imposing Order on Program Statements to Assist Anti-Virus Scanners.pdf
304 kB
Malware Detection using Statistical Analysis of Byte-Level File Content.pdf
304 kB
Backdoors et rootkits avanc+йs [SLIDES].pdf
302 kB
Computer viruses (BMJ 302-66e).pdf
302 kB
Malicious Codes in Depth.pdf
298 kB
Detecting Virus Mutations Via Dynamic Matching.pdf
298 kB
Des IDS et des vers... D+йtection par l'analyse statistique _ de la th+йorie +а la pratique _.pdf
295 kB
Pairwise alignment of metamorphic computer viruses.pdf
294 kB
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection.pdf
293 kB
MRSI A Fast Pattern Matching Algorithm for Anti-virus Applications.pdf
293 kB
Computer Virus Propagation Models.pdf
291 kB
Malware Research at SMU.pdf
289 kB
AGIS_ Towards Automatic Generation of Infection Signatures.pdf
288 kB
Anomalous Payload-based Network Intrusion Detection.pdf
285 kB
Conceptual Frameworks for Artificial Immune Systems.pdf
284 kB
A Potency Relation for Worms and Next-Generation Attack Tools.pdf
282 kB
Implica+зoes da ofusca+зao de c+¦digo no desenvolvimento de detectores de c+¦digo malicioso.pdf
282 kB
Countering Network Worms Through Automatic Patch Generation.pdf
281 kB
Anomalous Payload-based Worm Detection and Signature Generation.pdf
280 kB
Epidemic dynamics and endemic states in complex networks.pdf
279 kB
Epidemic Spreading in Real Networks_ An Eigenvalue Viewpoint.pdf
279 kB
A statistical model for undecidable viral detection.pdf
276 kB
Malware_ A Future Framework for Device, Network and Service Management.pdf
275 kB
Anti-Spyware Coalition Definitions and Supporting Documents.pdf
274 kB
A Sense of 'Danger' for Windows Processes.pdf
274 kB
A Survey of Cryptologic Issues in Computer Virology.pdf
271 kB
Development of Computer Vulnerability Scanning Scanning Workgroup.pdf
270 kB
Computer Viruses_ The Threat Today and The Expected Future.pdf
269 kB
HoneyStat_ Local Worm Detection Using Honeypots.pdf
266 kB
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.pdf
266 kB
Email networks and the spread of computer viruses.pdf
264 kB
An Architecture for Generating Semantic-Aware Signatures.pdf
263 kB
New thoughts in ring3 NT rootkit.pdf
260 kB
Parallels Between Biological and Computer Epidemics.pdf
260 kB
Extended recursion-based formalization of virus mutation.pdf
259 kB
Effectiveness of Rate Control in Slowing Down Worm Epidemics.pdf
259 kB
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior.pdf
257 kB
ELF et virologie informatique.pdf
257 kB
Malware Detection Using Adaptive Data Compression.pdf
257 kB
Convergence of Virus Writers and Hackers_ Fact or Fantasy_.pdf
255 kB
JAB, une backdoor pour reseau Win32 inconnu - Presentation SSTIC.pdf
255 kB
Immunization and epidemic dynamics in complex networks.pdf
253 kB
How to Kill Worms and Viruses with Policy Pontifications.pdf
253 kB
Comparing Passive and Active Worm Defenses.pdf
252 kB
Marginal Networks The Virus between Complexity and Suppression.pdf
252 kB
CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD_ VIRUSES AND COMPUTERS.pdf
251 kB
Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf
250 kB
Polymorphic Worm Detection Using Structural Information of Executables.pdf
250 kB
On the Performance of Internet Worm Scanning Strategies.pdf
249 kB
Hide'n'Seek_ Anatomy of Stealth Malware.pdf
248 kB
Anonymous and Malicious.pdf
248 kB
COMPUTER VIRUSES AND CIVIL LIABILITY_ A CONCEPTUAL FRAMEWORK.pdf
248 kB
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf
248 kB
Conflict and the Computer_ Information Warfare and Related Ethical Issues.pdf
248 kB
New malware distribution methods threaten signature-based AV.pdf
248 kB
Fast Detection of Scanning Worm Infections.pdf
247 kB
Combating computer viruses.pdf
246 kB
A Hybrid Model to Detect Malicious Executables.pdf
246 kB
Malware comes of age The arrival of the true computer parasite.pdf
244 kB
Design of a System for Real-Time Worm Detection.pdf
243 kB
Consensual Realities in Cyberspace.pdf
242 kB
Cheating the ELF Subversive Dynamic Linking to Libraries.pdf
240 kB
Adequacy of Checksum Algorithms for Computer Virus Detection.pdf
236 kB
Computer Viruses A Global Perspective.pdf
234 kB
Biologically Inspired Defenses Against Computer Viruses.pdf
234 kB
Modelling Development of Epidemics with Dynamic Small-World Networks.pdf
233 kB
Computer Viruses - Legal Options.pdf
233 kB
La _mobilit+й_ du code malveillant.pdf
233 kB
Antivirus update reaction times of major antivirus vendors.pdf
232 kB
Hunting for metamorphic 2.pdf
232 kB
Detecting Worms via Mining Dynamic Program Execution.pdf
231 kB
Computer Viruses_ Can It Happen At IU_.pdf
231 kB
A Feature Selection and Evaluation Scheme for Computer Virus Detection.pdf
230 kB
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf
230 kB
Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited_.pdf
229 kB
History of Viruses & Worms.pdf
229 kB
Advanced Routing Worm and Its Security Challenges.pdf
228 kB
A framework for modelling trojans and computer virus infection.pdf
228 kB
A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses.pdf
226 kB
Classification of Computer Viruses Using the Theory of Affordances.pdf
226 kB
Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf
225 kB
Computer viruses - the current state in Italy.pdf
225 kB
Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf
222 kB
Introduction to Network Self-defense_ technical and judicial issues.pdf
222 kB
Epidemics and immunization in scale-free networks.pdf
222 kB
Formalization of viruses and malware through process algebras.pdf
220 kB
Constructing Malware Normalizers using Term Rewriting.pdf
219 kB
Computer Viruses - A Form of Artificial Life .pdf
218 kB
On the Spread of Viruses on the Internet.pdf
218 kB
Comments on a paper by Voas, Payne & Cohen_ тАЬA model for detecting the existence of software corruption in real timeтАЭ.pdf
218 kB
How To Withstand Mobile Virus Attacks.pdf
217 kB
How to Withstand Mobile Virus Attacks 2.pdf
217 kB
Malware Phylogeny Generation using Permutations of Code.pdf
217 kB
N-gram analysis for computer virus detection.pdf
216 kB
Malware phylogeny generation using permutations of code 2.pdf
216 kB
Functional similarities between computer worms and biological pathogens.pdf
215 kB
Artificial Immune Systems and the Grand Challenge for Non-Classical Computation.pdf
213 kB
Beyond Layers and Peripheral Antivirus Security.pdf
213 kB
An Email Worm Vaccine Architecture.pdf
212 kB
Dynamic analysis of malicious code.pdf
212 kB
A Hygiene Lesson.pdf
212 kB
Learning to Detect Malicious Executables in the Wild.pdf
211 kB
Detecting Metamorphic Computer Viruses using Supercompilation.pdf
211 kB
Detection of metamorphic computer viruses using algebraic specification.pdf
211 kB
Models of Active Worm Defenses.pdf
210 kB
Attitude Adjustment_ Trojans and Malware on the Internet.pdf
207 kB
On the Time Complexity of Computer Viruses.pdf
206 kB
Computer viruses and electronic mail.pdf
204 kB
On abstract computer virology from a recursion-theoretic perspective.pdf
204 kB
Detecting worms through de-centralized monitoring.pdf
203 kB
As Japanese Bring Work Home, Virus Hitches a Ride.pdf
202 kB
Learning to Detect and Classify Malicious Executables in the Wild.pdf
202 kB
Effective and Inexpensive Methods Exist for Controlling Software Viruses.pdf
198 kB
An Introduction to Intrusion-Detection Systems.pdf
196 kB
Analyzing Worms and Network Traffic using Compression.pdf
196 kB
Classification of Packed Executables for Accurate Computer Virus Detection.pdf
195 kB
Monitoring and Early Warning for Internet Worms.pdf
195 kB
Inoculation strategies for victims of viruses and the sum-of-squares partition problem.pdf
195 kB
Is Your Cat Infected with a Computer Virus_.pdf
194 kB
Automated Defense from Rootkit Attacks.pdf
194 kB
A Trust System Based on Multi Level Virus Detection.pdf
193 kB
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf
191 kB
Computer Viruses_ The Disease, the Detection, and the Prescription for Protection Testimony.pdf
191 kB
Constructing Computer Virus Phylogenies.pdf
190 kB
An Efficient Control of Virus Propagation.pdf
189 kB
Do-It-Yourself Guide to Cell Phone Malware.pdf
188 kB
Countering Kernel Rootkits with Lightweight Hook Protection.pdf
188 kB
Detecting Windows Server Compromises with Patchfinder 2.pdf
187 kB
Exploiting an Antivirus Interface.pdf
187 kB
Autoimmune computer virus.pdf
187 kB
Autoimmune viruses.pdf
187 kB
Limits of Static Analysis for Malware Detection.pdf
185 kB
Broadband Network Virus Detection System Based on Bypass Monitor.pdf
183 kB
New threats of Java viruses.pdf
182 kB
A note on Cohen's formal model for computer viruses.pdf
182 kB
On Computer Viral Infection and the Effect of Immunization.pdf
180 kB
Covert Distributed Processing with Computer Viruses.pdf
180 kB
Evolution, Ecology and Optimization of Digital Organisms.pdf
179 kB
Bot Software Spreads, Causes New Worries.pdf
178 kB
On abstract computer virology from a recursion theoretic perspective 2.pdf
178 kB
High-Performance Context-Free Parser for Polymorphic Malware Detection.pdf
177 kB
Automated Malware Invariant Generation.pdf
176 kB
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods.pdf
175 kB
Binary Obfuscation Using Signals.pdf
175 kB
How to assess the effectiveness of your anti-virus_.pdf
174 kB
Networks, Control, and Life-Forms.pdf
174 kB
Code Red Worm Propagation Modeling and Analysis.pdf
174 kB
Contagion and Repetition_ On the Viral Logic of Network Culture.pdf
173 kB
Efficient quarantining of scanning worms_ optimal detection and coordination.pdf
173 kB
DCA for Bot Detection.pdf
173 kB
Evaluation of Two Host-Based Intrusion Prevention Systems.pdf
171 kB
An Evaluation of Two Host Based Intrusion Prevention Systems.pdf
171 kB
Polygraph_ Automatically Generating Signatures for Polymorphic Worms.pdf
171 kB
Die Gefahr Von Debug Codes.pdf
170 kB
Malicious Cryptography_ Kleptographic Aspects.pdf
168 kB
A Memory Symptom-based Virus Detection Approach.pdf
167 kB
Open problems in computer virology.pdf
167 kB
FPGA Viruses.pdf
166 kB
Detecting Early Worm Propagation through Packet Matching.pdf
164 kB
On the Semantics of Self-Unpacking Malware Code.pdf
164 kB
A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf
164 kB
Abstract Detection of Computer Viruses.pdf
163 kB
MetaAware_ Identifying Metamorphic Malware.pdf
163 kB
A unified prediction of computer virus spread in connected networks.pdf
163 kB
Defending against Hitlist Worms using Network Address Space Randomization.pdf
163 kB
Algebraic Specification of Computer Viruses and Their Environments.pdf
162 kB
Infection, imitation and a hierarchy of computer viruses.pdf
162 kB
Normalizing Metamorphic Malware Using Term Rewriting.pdf
161 kB
Epidemic Profiles and Defense of Scale-Free Networks.pdf
161 kB
An OS Independent Heuristics-based Worm-containment System.pdf
159 kB
Control Flow Graphs as Malware Signatures.pdf
158 kB
Data Mining Methods for Detection of New Malicious Executables.pdf
158 kB
A Classification of Viruses through Recursion Theorems.pdf
157 kB
Computer Malware_ What You Don't Know Can Hurt You.pdf
157 kB
Efficiency of Trusted Platform Module Against Computer Attacks.pdf
157 kB
Defending Against Internet Worms_ A Signature-Based Approach.pdf
156 kB
Execution Context in Anti-Malware Testing.pdf
156 kB
CrT+ation d'un _Web Worm_.pdf
155 kB
Acquisition of Malicious Code Using Active Learning.pdf
154 kB
Infection dynamics on the Internet.pdf
154 kB
Cryptographic Hashing for Virus Localization.pdf
154 kB
Internet Quarantine_ Requirements for Containing Self-Propagating Code 2.pdf
153 kB
Internet Quarantine_ Requirements for Containing Self-Propagating Code.pdf
153 kB
Computer Viruses A Very Real Threat.pdf
152 kB
Magisterium Abraxas.pdf
152 kB
Digital Postmark Helps Fight Spam, Virus Attacks.pdf
151 kB
Countering NetworkWorms Through Automatic Patch Generation.pdf
150 kB
An epidemiological model of virus spread and cleanup.pdf
150 kB
Harmless and Useful Viruses Can Hardly Exist.pdf
150 kB
Network Worms.pdf
149 kB
A Web-Based Network Worm Simulator.pdf
145 kB
Applications of Genetic Algorithms to Malware Detection and Creation.pdf
144 kB
Computer viruses demystified,2.pdf
144 kB
Feedback Email Worm Defense System for Enterprise Networks.pdf
144 kB
Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance.pdf
143 kB
A study of anti-virus' response to unknown threats.pdf
142 kB
An Epidemiological View of Worms and Viruses.pdf
142 kB
Computers and epidemiology.pdf
142 kB
Automatic Static Unpacking of Malware Binaries.pdf
142 kB
Hash-AV_ Fast Virus Signature Scanning by Cache-Resident Filters.pdf
142 kB
Defense-In-Depth Against Computer Viruses.pdf
141 kB
Accurately Detecting Source Code of Attacks That Increase Privilege.pdf
139 kB
A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.pdf
139 kB
Implementing and testing a virus throttle.pdf
137 kB
Computer Worms_ Past, Present, and Future.pdf
136 kB
Internet computer virus protection policy.pdf
136 kB
Detecting Internet Worms Using Data Mining Techniques.pdf
136 kB
Biological Aspects of Computer Virology.pdf
135 kB
Blueprint for a Computer Immune System.pdf
134 kB
Malware in Popular Networks.pdf
133 kB
A Plague of Viruses_ Biological, Computer and Marketing.pdf
133 kB
Computer Viruses as Artificial Life.pdf
133 kB
Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures.pdf
132 kB
Danger! Deadly new computer viruses want to kill your PC.pdf
131 kB
Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf
130 kB
Fighting Computer Viruses.pdf
129 kB
Modeling Virus Propagation in Peer-to-Peer Networks.pdf
129 kB
Computer doctor busy fighting `viruses'.pdf
126 kB
Managing Computer Viruses in a Groupware Environment.pdf
124 kB
Benefits and Considerations for a Single-Vendor Antivirus Strategy.pdf
123 kB
Contournement d%92une passerelle antivirus.pdf
122 kB
Mind Wars_ Attack of the Memes.pdf
120 kB
On behavioral detection.pdf
119 kB
Console viruses_.pdf
119 kB
Contagion on the Internet.pdf
118 kB
On the definition and classification of cybercrime.pdf
117 kB
Are Handheld Viruses a Significant Threat_.pdf
117 kB
On the functional validity of the worm-killing worm.pdf
116 kB
Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf
115 kB
New method of fighting computer viruses announced.pdf
115 kB
Detection of Self-Mutating Computer Viruses.pdf
114 kB
Nematodes - Beneficial Worms.pdf
114 kB
Parallel analysis of polymorphic viral code using automated deduction system.pdf
113 kB
Linux Improvised Userland Scheduler Virus.pdf
112 kB
Mathematical Viruses.pdf
112 kB
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware.pdf
111 kB
A Dozen Dangerous Myths About Computer Viruses.pdf
109 kB
BIRD_ Binary Interpretation using Runtime Disassembly.pdf
108 kB
Modular worms.pdf
108 kB
A Bypass of Cohen's Impossibility Result.pdf
107 kB
A Pact with the Devil.pdf
106 kB
Catch Me, If You Can_ Evading Network Signatures with Web-based Polymorphic Worms.pdf
106 kB
Epidemiological Models Applied to Viruses in Computer Networks.pdf
106 kB
Data security from malicious attack_ Computer Virus.pdf
106 kB
Avoiding Windows Rootkit Detection.pdf
106 kB
Finding Malware on Compromised Windows Machines.pdf
102 kB
Defense Against the Dark Arts.pdf
100 kB
A Taxonomy of Computer Worms.pdf
100 kB
Equational reasoning уВТчФиуБДуБЯ obfuscated decipher routine уБоуГСуГйуГбуГ-уВ¬цдЬхЗ¦.pdf
99 kB
Detecting self-mutating malware using control-flow graph matching.pdf
98 kB
Efficient Content-Based Detection of Zero-Day Worms.pdf
98 kB
Abstracts of Recent Articles and Literature.pdf
98 kB
Computer Viruses and What to Do About Them.pdf
97 kB
Computer Parasitology.pdf
97 kB
A Critical Look at the Regulation of Computer Viruses.pdf
96 kB
A Generic Virus Scanner in C++.pdf
96 kB
Cryptography and Viruses.pdf
96 kB
Faster parameter detection of polymorphic viral binary code using hot list strategy.pdf
95 kB
A Failure to Learn from the Past.pdf
95 kB
ASM-based Modelling of Self-Replicating Programs.pdf
93 kB
Computer virus prevention a primer.pdf
92 kB
Intrusion Detection for Viruses and Worms.pdf
92 kB
One-hit models for virus inactivation studies.pdf
92 kB
File system driver filtering against metamorphic viral coding.pdf
91 kB
Flexible Infections_ Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism.pdf
91 kB
Mathematical Model of Computer Viruses.pdf
90 kB
Computer virus cover withdrawn.pdf
90 kB
Generic Virus Scanner in C++.pdf
90 kB
Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection_.pdf
90 kB
From AntiVirus to AntiMalware Software and Beyond.pdf
90 kB
Anti-Virus in the Corporate Arena.pdf
90 kB
Future Trends in Malicious Code - 2006 Report.pdf
87 kB
Le malware en 2005 %96 Unix, Linux et autres plates-formes.pdf
86 kB
Computers under attacks!.pdf
85 kB
Painting the Internet_ A Different Kind of Warhol Worm.pdf
84 kB
N-gram-based Detection of New Malicious Code.pdf
84 kB
Immunity-Based Intrusion Detection System_ A General Framework.pdf
83 kB
Mobile Code Threats, Fact or Fiction.pdf
83 kB
Next-Generation Viruses Present New Challenges.pdf
83 kB
AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION.pdf
82 kB
An Internet-Worm Early Warning System.pdf
81 kB
Poison Ivy Farmers_ Virus Collections.pdf
80 kB
Attack of the killer virus!.pdf
79 kB
Computer Security Analysis through Decompilation and High-Level Debugging.pdf
79 kB
Malicious Threats to Personal Digital Assistants.pdf
79 kB
Computer Virus Strategies and Detection Methods.pdf
78 kB
Can cryptography prevent computer viruses_.pdf
77 kB
Information warfare and security.pdf
77 kB
Let free(dom) Ring!.pdf
76 kB
Computer Viruses as a Threat to Home Users.pdf
76 kB
JAB, une backdoor pour reseau Win32 inconnu.pdf
75 kB
A Cooperative Immunization System for an Untrusting Internet.pdf
75 kB
Becoming Positive.pdf
74 kB
Computer-Generated Life.pdf
74 kB
A pilot study on college student's attitudes toward computer virus.pdf
74 kB
Formal Definition of Self-reproductive Systems.pdf
74 kB
Malware analysis for windows administrators.pdf
73 kB
An Overview of Computer Viruses in a Research Environment.pdf
72 kB
ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETECTORS.pdf
72 kB
A Network Worm Vaccine Architecture.pdf
71 kB
A Tour of the Worm.pdf
70 kB
Information Assurance and the Information Society.pdf
69 kB
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector.pdf
69 kB
Analysis of Virus Algorithms.pdf
69 kB
A Sense of Self for Unix Processes.pdf
68 kB
An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code.pdf
67 kB
A week is a long time in computer ethics.pdf
66 kB
A Worst-Case Worm.pdf
66 kB
I've named my virus - now what do I win_!.pdf
65 kB
Biological Models of Security for Virus Propagation in Computer Networks.pdf
65 kB
Malicious Data and Computer Security.pdf
64 kB
Ani-hilate this week.pdf
64 kB
Approaches to Integrated Malware Detection and Avoidance.pdf
62 kB
Impeding worm epidemics through destination address filtering.pdf
62 kB
$$$_+$$+$$__+_$+$$_$+$$$_+$$_$.pdf
59 kB
Do the macarena.pdf
58 kB
Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'.pdf
57 kB
Anti-Virus Product Evaluation in the Real World.pdf
57 kB
Infection dynamics on scale-free networks.pdf
57 kB
Computer intrusions and attacks.pdf
57 kB
Gatt got your tongue_.pdf
56 kB
Paradise lost.pdf
56 kB
COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT TECHNOLOGY.pdf
56 kB
I love you.pdf
56 kB
Flying solo.pdf
55 kB
Creating a Secure Computer Virus Laboratory.pdf
54 kB
Halting viruses in scale-free networks.pdf
54 kB
Antivirus Software Testing for the New Millenium.pdf
53 kB
Anti-Disassembly using Cryptographic Hash Functions.pdf
52 kB
Incorporating E-Commerce, Internet and Telecommunications Security.pdf
51 kB
Leaps and Bounds.pdf
50 kB
COMPUTER VIRUSES_ PREVENTION, DETECTION, AND TREATMENT.pdf
50 kB
It's a bird, it's a plane, it's Fooperman.pdf
50 kB
Implementing Anti-Virus Controls in the Corporate Arena.pdf
49 kB
An Epidemic Model of Mobile Phone Virus.pdf
49 kB
Hunting Obfuscated Malwares by Abstract Interpretation.pdf
48 kB
Deelaed learning.pdf
47 kB
Malware.pdf
47 kB
Hidan and dangerous.pdf
47 kB
Mostly harmless.pdf
46 kB
Doin' the eagle rock.pdf
45 kB
Computer Virus Identification and Prevention.pdf
44 kB
Crimea river.pdf
44 kB
Can you spare a seg_.pdf
44 kB
Bad Transfer.pdf
44 kB
Language, a virus_.pdf
44 kB
Are Computer Hacker Break-ins Ethical_.pdf
44 kB
Criss-cross.pdf
44 kB
Looking a Bagift-Horse in the Mouth.pdf
43 kB
Open Problems in Computer Virus Research.pdf
42 kB
Malicious Cryptography_ Cryptovirology and Kleptography.pdf
42 kB
Cain and Abul.pdf
41 kB
Got [Mac]root_.pdf
41 kB
Chamber of horrors.pdf
41 kB
Flibi night.pdf
41 kB
Not Teaching Viruses and Worms Is Harmful.pdf
40 kB
Attack of the Clones.pdf
39 kB
Making a hash of things.pdf
39 kB
Not worthy.pdf
38 kB
Look at that escargot.pdf
38 kB
An Introduction to Computer Viruses.pdf
38 kB
HIPAA and Information Security Policies.pdf
38 kB
Cabirn fever.pdf
37 kB
Computer abuse_ vandalizing the information society.pdf
36 kB
Heads or tails.pdf
36 kB
Challenges in getting 'formal' with viruses.pdf
34 kB
An Undetectable Computer Virus.pdf
33 kB
Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf
31 kB
Computer Viruses and Related Threats.pdf
31 kB
It's zell(d)ome the one you expect.pdf
30 kB
64-bit rugrats.pdf
30 kB
Blast off!.pdf
30 kB
COMPUTER VIRUS_ FUTURE CYBER WEAPONS.pdf
28 kB
Chiba witty blues.pdf
27 kB
Darwin, a Game of Survival of the Fittest among Programs.pdf
26 kB
Nimda Worm Shows You Can't Always Patch Fast Enough.pdf
24 kB
Computer Viruses_ A Management Perspective.pdf
24 kB
Let them eat brioche.pdf
23 kB
How the virus _Remote Shell Trojan_ (RST) works.pdf
21 kB
Corporate Virus Protection.pdf
20 kB
Computer Viruses and Their Control.pdf
19 kB
Do The Media Spread Computer Viruses.pdf
18 kB
Controlling Super-Intelligent Machines.pdf
18 kB
Computer Virus__.pdf
16 kB
A Computational Model of Computer Virus Propagation.pdf
14 kB
Iranian Journal Examines Electronic Warfare.pdf
12 kB
A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig.pdf
12 kB
Is creating virus software protected as a first amendment right_.pdf
12 kB
Computer Viruses Are Nothing New Don't be ashamed.pdf
10 kB
Killer Apps.pdf
10 kB
A Computer Virus Is A Thought Manifested.pdf
5.6 kB
GETTING THE WORD OUT.pdf
5.6 kB
Are computer viruses spread by the media_.pdf
3.9 kB