TorBT - Torrents and Magnet Links Search Engine
PDF Pack Release 4
- Date: 2026-05-03
- Size: 264 MB
- Files: 239
File Name
Size
Selbstreproduktion bei programmen.pdf
38 MB
Malicious Cryptography - Exposing Cryptovirology.pdf
29 MB
Malware Forensics Investigating and Analyzing Malicious Code.pdf
25 MB
Malware Von Viren, Wuermern, Hackern und Trojanern und wie man sich vor ihnen schuetzt.pdf
22 MB
Malware Detection.pdf
18 MB
PC Magazine Fighting Spyware Viruses and Malware.pdf
10 MB
Malware Analyst's Cookbook and DVD.pdf
8.9 MB
Mobile Malware Attacks and Defense.pdf
6.7 MB
On self-reproducing computer programs.pdf
6.2 MB
Rogue Computer Programs.pdf
4.3 MB
Malicious crypto - (Ab)use cryptology.pdf
3.8 MB
Malicious crypto.pdf
3.8 MB
Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf
2.2 MB
Peer-to-Peer Botnets Analysis and Detection.pdf
2.2 MB
Multi-Stage Delivery of Malware.pdf
2.0 MB
On Callgraphs and Generative Mechanisms.pdf
1.8 MB
Malicious origami in PDF.pdf
1.8 MB
Mechanics of Self-reproduction.pdf
1.7 MB
Some Further Theoretical Results about Computer Viruses.pdf
1.6 MB
Prepared testimony and statement for the record on computer virus legislation.pdf
1.5 MB
Rotalum A Tool for Automatic Reverse Engineering of Malware Emulators.pdf
1.5 MB
Simulating malware with MAlSim.pdf
1.4 MB
Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf
1.3 MB
Notes on the Worms programs.pdf
1.3 MB
Polymorphic and Metamorphic Malware Detection.pdf
1.3 MB
Stoned Bootkit.pdf
1.2 MB
On Effectiveness of Defense Systems against Active Worms.pdf
1.2 MB
Reverse Code Engineering An In-Depth Analysis of the Bagle Virus.pdf
1.2 MB
SPARSE A Hybrid System to Detect Malcode-Bearing Documents.pdf
1.2 MB
Measuring and Modeling Computer Virus Prevalence.pdf
1.2 MB
Should We Teach Virus Writing.pdf
1.1 MB
Model for network behaviour under viral attack.pdf
1.1 MB
Practical Detection of Metamorphic Computer Viruses.pdf
1.1 MB
Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf
1.1 MB
Practical overview of a Xen covert channel.pdf
1.1 MB
Metamorphic Virus Analysis and Detection.pdf
1.0 MB
Non-signature based virus detection.pdf
992 kB
Procedures To Reduce The Computer Virus Threat.pdf
976 kB
Metaphors and Modern Threats Biological, Computer, and Cognitive Viruses.pdf
962 kB
Quantitative risk assessment of computer virus attacks on computer networks.pdf
961 kB
Rootkits - Detection and prevention.pdf
930 kB
Small treatise about e-manipulation for honest people.pdf
915 kB
Malware behaviour analysis.pdf
899 kB
Panic computing The viral metaphor and computer technology.pdf
876 kB
Profile hidden Markov models and metamorphic virus detection.pdf
865 kB
Static Detection of Malicious Code in Executable Programs.pdf
792 kB
Modeling Malware Spreading Dynamics.pdf
790 kB
Morphological Detection of Malware.pdf
787 kB
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.pdf
786 kB
Measuring virtual machine detection in malware using DSD tracer.pdf
764 kB
Static detection and identification of X86 malicious executables A multidisciplinary approach.pdf
688 kB
Server-based Virus-protection On UnixLinux.pdf
684 kB
Modeling the Effects of Timing Parameters on Virus Propagation.pdf
678 kB
New data mining technique to enhance IDS alarms quality.pdf
672 kB
Opcodes as Predictor for Malware.pdf
660 kB
Modeling the Spread of Active Worms.pdf
632 kB
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf
630 kB
Prophylaxis for virus propagation and general computer security policy.pdf
617 kB
Modeling Computer Viruses.pdf
596 kB
Polymorphic virus detection technology.pdf
580 kB
Modeling Epidemic Spreading in Mobile Environments.pdf
574 kB
Shadow Walker - Raising The Bar For Rootkit Detection.pdf
557 kB
SBMDS an interpretable string based malware detection system using SVM ensemble with bagging.pdf
533 kB
Modeling Botnet Propagation Using Time Zones.pdf
528 kB
Predators Good Will Mobile Codes Combat against Computer Viruses.pdf
514 kB
SmartSiren Virus Detection and Alert for Smartphones.pdf
509 kB
Malware Detection Based on Suspicious Behavior Identification.pdf
492 kB
On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf
487 kB
Password Cracking A Game of Wits.pdf
477 kB
Malware, Viruses and Log Visualisation.pdf
474 kB
PE-Miner Mining Structural Information to Detect Malicious Executables in Realtime.pdf
464 kB
Supervisory control of malicious executables.pdf
463 kB
Scalable, Behavior-Based Malware Clustering.pdf
462 kB
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf
448 kB
Sobig, sobigger, sobiggest.pdf
447 kB
On JavaScript Malware and related threats.pdf
436 kB
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf
433 kB
Modern operating systems.pdf
425 kB
Malicious Software in Mobile Devices.pdf
395 kB
Mimimorphism A New Approach to Binary Code Obfuscation.pdf
387 kB
Malware pattern scanning schemes secure against black-box analysis.pdf
385 kB
Metaphors And Meta-Experiences In Technology Side Effects A Multimedia Exhibit.pdf
380 kB
On the possibility of practically obfuscating programs.pdf
373 kB
Misleading Modern Malware.pdf
370 kB
Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf
369 kB
SinFP, unification of active and passive operating system fingerprinting.pdf
364 kB
Shield -- A First Line Worm Defense.pdf
362 kB
Malicious Software.pdf
360 kB
Mathematical models on computer viruses.pdf
354 kB
Old Win32 Code for a Modern Super-stealth Trojan.pdf
352 kB
Reverse Engineering Malware.pdf
351 kB
Research in Computer Viruses and Worms.pdf
349 kB
Rootkit Hunting vs. Compromise Detection.pdf
340 kB
On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf
335 kB
Profiles in cyber courage.pdf
331 kB
Polymorphing Software by Randomizing Data Structure Layout.pdf
324 kB
Model-Based Analysis of Two Fighting Worms.pdf
320 kB
Self-reproducing machines.pdf
315 kB
On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf
312 kB
Malware Normalization.pdf
312 kB
Software Transformations to Improve Malware Detection.pdf
307 kB
Malware Detection using Statistical Analysis of Byte-Level File Content.pdf
304 kB
Static Analysis of Executables to Detect Malicious Patterns.pdf
303 kB
Malicious Codes in Depth.pdf
298 kB
Response to the Proposal for a Virus database.pdf
296 kB
Pairwise alignment of metamorphic computer viruses.pdf
294 kB
Source Code Analysis of Worms.pdf
290 kB
Malware Research at SMU.pdf
289 kB
Signature Generation and Detection of Malware Families.pdf
287 kB
Queuing theory based models for studying intrusion evolution and elimination in computer networks.pdf
278 kB
MalwareA Future Framework for Device, Network and Service Management.pdf
275 kB
Quantum Malware.pdf
273 kB
Recent Worms A Survey and Trends.pdf
268 kB
Simulating and optimising worm propagation algorithms.pdf
268 kB
PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN P2P NETWORKS.pdf
263 kB
New thoughts in ring3 NT rootkit.pdf
260 kB
Parallels Between Biological and Computer Epidemics.pdf
260 kB
Malware Detection Using Adaptive Data Compression.pdf
257 kB
Marginal Networks The Virus between Complexity and Suppression.pdf
252 kB
RFID Security Issues in Military Supply Chains.pdf
250 kB
Polymorphic Worm Detection Using Structural Information of Executables.pdf
250 kB
On the Performance of Internet Worm Scanning Strategies.pdf
249 kB
New malware distribution methods threaten signature-based AV.pdf
248 kB
Malware comes of age The arrival of the true computer parasite.pdf
244 kB
Sandbox Technology Inside AV Scanners.pdf
241 kB
Modelling Development of Epidemics with Dynamic Small-World Networks.pdf
233 kB
Semantics-Aware Malware Detection.pdf
231 kB
Reflections on Trusting Trust.pdf
220 kB
On the Spread of Viruses on the Internet.pdf
218 kB
Malware Phylogeny Generation using Permutations of Code.pdf
217 kB
N-gram analysis for computer virus detection.pdf
216 kB
Models of Active Worm Defenses.pdf
210 kB
Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection.pdf
209 kB
Securing Instant Messaging.pdf
207 kB
On the Time Complexity of Computer Viruses.pdf
206 kB
Self-Nonself Discrimination in a Computer.pdf
205 kB
SubVirt Implementing malware with virtual machines.pdf
204 kB
On abstract computer virology from a recursion-theoretic perspective.pdf
204 kB
Rebels for the System Virus writers, general intellect, cyberpunk and criminal capitalism.pdf
202 kB
Stay Safe Online Campaign's AntiVirus Presentation.pdf
200 kB
Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis the Bradley Virus.pdf
196 kB
Shield Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits.pdf
195 kB
Monitoring and Early Warning for Internet Worms.pdf
195 kB
Slack Space Sculpting the computer monsters -- virus inspiration.pdf
193 kB
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf
191 kB
Software Diversity as a Defense Against Viral Propagation Models and Simulations.pdf
190 kB
Rootkits Analysis and Detection.pdf
190 kB
New threats of Java viruses.pdf
182 kB
Stack Shape Analysis to Detect Obfuscated calls in Binaries.pdf
182 kB
On Computer Viral Infection and the Effect of Immunization.pdf
180 kB
On abstract computer virology from a recursion theoretic perspective.pdf
178 kB
Networks, Control, and Life-Forms.pdf
174 kB
Polygraph Automatically Generating Signatures for Polymorphic Worms.pdf
171 kB
Malicious Cryptography Kleptographic Aspects.pdf
168 kB
Open problems in computer virology.pdf
167 kB
Software Vaccine Technique and Its Application in Early Virus Finding and Tracing.pdf
165 kB
On the Semantics of Self-Unpacking Malware Code.pdf
164 kB
MetaAware Identifying Metamorphic Malware.pdf
163 kB
Normalizing Metamorphic Malware Using Term Rewriting.pdf
161 kB
Survey on Malware Detection Methods.pdf
159 kB
Some human dimensions of computer virus creation and infection.pdf
156 kB
Superworms and Cryptovirology a Deadly Combination.pdf
154 kB
Revealing Packed Malware.pdf
153 kB
Seminar Report on Study of Viruses and Worms.pdf
152 kB
Suppressing the spread of email malcode using short-term message recall.pdf
151 kB
Routing Worm A Fast, Selective Attack Worm based on IP Address Information.pdf
149 kB
Network Worms.pdf
149 kB
SirCamstantial Evidence.pdf
148 kB
Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware.pdf
148 kB
On the Effectiveness of Address-Space Randomization.pdf
147 kB
Owning Antivirus.pdf
145 kB
Scary Networks Viruses as Discursive Practice.pdf
145 kB
Malware in Popular Networks.pdf
133 kB
Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf
130 kB
Modeling Virus Propagation in Peer-to-Peer Networks.pdf
129 kB
Potential Threats to WAP Enabled Devices.pdf
129 kB
Managing Computer Viruses in a Groupware Environment.pdf
124 kB
Prosecuting Computer Virus Authors The Need for an Adequate and Immediate International Solution.pdf
122 kB
Self- information systems why not.pdf
120 kB
Mind Wars Attack of the Memes.pdf
120 kB
On behavioral detection.pdf
119 kB
On the definition and classification of cybercrime.pdf
117 kB
On the functional validity of the worm-killing worm.pdf
116 kB
Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf
115 kB
New method of fighting computer viruses announced.pdf
115 kB
Nematodes - Beneficial Worms.pdf
114 kB
Parallel analysis of polymorphic viral code using automated deduction system.pdf
113 kB
Mathematical Viruses.pdf
112 kB
Modular worms.pdf
108 kB
Structuring ethical curricula in the information age.pdf
107 kB
Powerful virus hits computers.pdf
100 kB
Stochastic Features of Computer Viruses.pdf
96 kB
Spyware and Rootkits - The Future Convergence.pdf
94 kB
One-hit models for virus inactivation studies.pdf
92 kB
Mathematical Model of Computer Viruses.pdf
90 kB
Spyware A Little Knowledge is a Wonderful Thing.pdf
89 kB
Reports of computer viruses on the increase.pdf
88 kB
Painting the Internet A Different Kind of Warhol Worm.pdf
84 kB
N-gram-based Detection of New Malicious Code.pdf
84 kB
Mobile Code Threats, Fact or Fiction.pdf
83 kB
Next-Generation Viruses Present New Challenges.pdf
83 kB
Running head REVERSE ENGINEERING MALWARE.pdf
81 kB
Poison Ivy Farmers Virus Collections.pdf
80 kB
Malicious Threats to Personal Digital Assistants.pdf
79 kB
Resolution based metamorphic computer virus detection using redundancy control strategy.pdf
79 kB
Possible Vicarious Liability for Computer Users in the USA.pdf
74 kB
Malware analysis for windows administrators.pdf
73 kB
Simulating Bandwidth-Limited Worms, One Graph to Rule Them All.pdf
72 kB
Prophet and loss.pdf
72 kB
Spyware & Rootkits.pdf
71 kB
Reliable Identification of Bounded-length Viruses is NP-complete.pdf
70 kB
Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf
68 kB
Malicious Data and Computer Security.pdf
64 kB
Real world anti-virus product reviews and evaluations - the current state of affairs.pdf
59 kB
Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen - Thimbleby.pdf
58 kB
Principles of a Computer Immune System.pdf
58 kB
Reductions of the general virus detection problem.pdf
57 kB
Paradise lost.pdf
56 kB
Prescription Medicine.pdf
52 kB
Raised hacklez.pdf
50 kB
Self-Replicating Turing Machines and Computer Viruses.pdf
48 kB
Striking Similarities.pdf
47 kB
Malware.pdf
47 kB
Mostly harmless.pdf
46 kB
Protection of computer systems from computer viruses ethical and practical issues.pdf
43 kB
Slamdunk.pdf
42 kB
Open Problems in Computer Virus Research.pdf
42 kB
Malicious Cryptography Cryptovirology and Kleptography.pdf
42 kB
Not Teaching Viruses and Worms Is Harmful.pdf
40 kB
Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen.pdf
39 kB
Making a hash of things.pdf
39 kB
Something smells fishy.pdf
38 kB
Not worthy.pdf
38 kB
Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf
31 kB
Rootkits - The new wave of invisible malware is here.pdf
30 kB
Nimda Worm Shows You Can't Always Patch Fast Enough.pdf
24 kB
Slackspace.pdf
22 kB
Real-Time Virus Detection System Using iNetmon Engine.pdf
21 kB
Sleep-Inducing.pdf
21 kB