PDF Pack Release 4
File List
- Selbstreproduktion bei programmen.pdf 37.7 MB
- Malicious Cryptography - Exposing Cryptovirology.pdf 29.1 MB
- Malware Forensics Investigating and Analyzing Malicious Code.pdf 25.0 MB
- Malware Von Viren, Wuermern, Hackern und Trojanern und wie man sich vor ihnen schuetzt.pdf 21.6 MB
- Malware Detection.pdf 18.5 MB
- PC Magazine Fighting Spyware Viruses and Malware.pdf 10.4 MB
- Malware Analyst's Cookbook and DVD.pdf 8.9 MB
- Mobile Malware Attacks and Defense.pdf 6.7 MB
- On self-reproducing computer programs.pdf 6.2 MB
- Rogue Computer Programs.pdf 4.3 MB
- Malicious crypto - (Ab)use cryptology.pdf 3.8 MB
- Malicious crypto.pdf 3.8 MB
- Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf 2.2 MB
- Peer-to-Peer Botnets Analysis and Detection.pdf 2.2 MB
- Multi-Stage Delivery of Malware.pdf 2.0 MB
- On Callgraphs and Generative Mechanisms.pdf 1.8 MB
- Malicious origami in PDF.pdf 1.8 MB
- Mechanics of Self-reproduction.pdf 1.7 MB
- Some Further Theoretical Results about Computer Viruses.pdf 1.6 MB
- Prepared testimony and statement for the record on computer virus legislation.pdf 1.5 MB
- Rotalum A Tool for Automatic Reverse Engineering of Malware Emulators.pdf 1.5 MB
- Simulating malware with MAlSim.pdf 1.4 MB
- Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf 1.3 MB
- Notes on the Worms programs.pdf 1.3 MB
- Polymorphic and Metamorphic Malware Detection.pdf 1.3 MB
- Stoned Bootkit.pdf 1.2 MB
- On Effectiveness of Defense Systems against Active Worms.pdf 1.2 MB
- Reverse Code Engineering An In-Depth Analysis of the Bagle Virus.pdf 1.2 MB
- SPARSE A Hybrid System to Detect Malcode-Bearing Documents.pdf 1.2 MB
- Measuring and Modeling Computer Virus Prevalence.pdf 1.2 MB
- Should We Teach Virus Writing.pdf 1.1 MB
- Model for network behaviour under viral attack.pdf 1.1 MB
- Practical Detection of Metamorphic Computer Viruses.pdf 1.1 MB
- Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf 1.1 MB
- Practical overview of a Xen covert channel.pdf 1.1 MB
- Metamorphic Virus Analysis and Detection.pdf 1.0 MB
- Non-signature based virus detection.pdf 992.0 KB
- Procedures To Reduce The Computer Virus Threat.pdf 975.6 KB
- Metaphors and Modern Threats Biological, Computer, and Cognitive Viruses.pdf 962.3 KB
- Quantitative risk assessment of computer virus attacks on computer networks.pdf 961.2 KB
- Rootkits - Detection and prevention.pdf 929.8 KB
- Small treatise about e-manipulation for honest people.pdf 915.2 KB
- Malware behaviour analysis.pdf 899.3 KB
- Panic computing The viral metaphor and computer technology.pdf 876.4 KB
- Profile hidden Markov models and metamorphic virus detection.pdf 864.6 KB
- Static Detection of Malicious Code in Executable Programs.pdf 792.1 KB
- Modeling Malware Spreading Dynamics.pdf 789.9 KB
- Morphological Detection of Malware.pdf 786.7 KB
- Specification and evaluation of polymorphic shellcode properties using a new temporal logic.pdf 786.0 KB
- Measuring virtual machine detection in malware using DSD tracer.pdf 763.8 KB
- Static detection and identification of X86 malicious executables A multidisciplinary approach.pdf 688.2 KB
- Server-based Virus-protection On UnixLinux.pdf 684.1 KB
- Modeling the Effects of Timing Parameters on Virus Propagation.pdf 678.0 KB
- New data mining technique to enhance IDS alarms quality.pdf 671.8 KB
- Opcodes as Predictor for Malware.pdf 660.2 KB
- Modeling the Spread of Active Worms.pdf 632.3 KB
- Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf 630.5 KB
- Prophylaxis for virus propagation and general computer security policy.pdf 617.1 KB
- Modeling Computer Viruses.pdf 595.5 KB
- Polymorphic virus detection technology.pdf 579.5 KB
- Modeling Epidemic Spreading in Mobile Environments.pdf 573.5 KB
- Shadow Walker - Raising The Bar For Rootkit Detection.pdf 557.0 KB
- SBMDS an interpretable string based malware detection system using SVM ensemble with bagging.pdf 533.3 KB
- Modeling Botnet Propagation Using Time Zones.pdf 528.4 KB
- Predators Good Will Mobile Codes Combat against Computer Viruses.pdf 513.9 KB
- SmartSiren Virus Detection and Alert for Smartphones.pdf 508.7 KB
- Malware Detection Based on Suspicious Behavior Identification.pdf 491.9 KB
- On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf 487.1 KB
- Password Cracking A Game of Wits.pdf 476.6 KB
- Malware, Viruses and Log Visualisation.pdf 474.3 KB
- PE-Miner Mining Structural Information to Detect Malicious Executables in Realtime.pdf 464.0 KB
- Supervisory control of malicious executables.pdf 462.6 KB
- Scalable, Behavior-Based Malware Clustering.pdf 461.5 KB
- Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf 447.7 KB
- Sobig, sobigger, sobiggest.pdf 446.9 KB
- On JavaScript Malware and related threats.pdf 436.1 KB
- Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf 433.2 KB
- Modern operating systems.pdf 425.0 KB
- Malicious Software in Mobile Devices.pdf 394.9 KB
- Mimimorphism A New Approach to Binary Code Obfuscation.pdf 386.9 KB
- Malware pattern scanning schemes secure against black-box analysis.pdf 384.8 KB
- Metaphors And Meta-Experiences In Technology Side Effects A Multimedia Exhibit.pdf 380.1 KB
- On the possibility of practically obfuscating programs.pdf 372.6 KB
- Misleading Modern Malware.pdf 369.5 KB
- Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf 369.4 KB
- SinFP, unification of active and passive operating system fingerprinting.pdf 363.7 KB
- Shield -- A First Line Worm Defense.pdf 361.6 KB
- Malicious Software.pdf 360.0 KB
- Mathematical models on computer viruses.pdf 353.5 KB
- Old Win32 Code for a Modern Super-stealth Trojan.pdf 351.8 KB
- Reverse Engineering Malware.pdf 351.4 KB
- Research in Computer Viruses and Worms.pdf 349.3 KB
- Rootkit Hunting vs. Compromise Detection.pdf 339.7 KB
- On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf 334.6 KB
- Profiles in cyber courage.pdf 330.7 KB
- Polymorphing Software by Randomizing Data Structure Layout.pdf 323.7 KB
- Model-Based Analysis of Two Fighting Worms.pdf 320.0 KB
- Self-reproducing machines.pdf 315.4 KB
- On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf 312.5 KB
- Malware Normalization.pdf 312.0 KB
- Software Transformations to Improve Malware Detection.pdf 306.9 KB
- Malware Detection using Statistical Analysis of Byte-Level File Content.pdf 303.7 KB
- Static Analysis of Executables to Detect Malicious Patterns.pdf 303.0 KB
- Malicious Codes in Depth.pdf 298.1 KB
- Response to the Proposal for a Virus database.pdf 296.4 KB
- Pairwise alignment of metamorphic computer viruses.pdf 294.4 KB
- Source Code Analysis of Worms.pdf 290.0 KB
- Malware Research at SMU.pdf 288.7 KB
- Signature Generation and Detection of Malware Families.pdf 287.1 KB
- Queuing theory based models for studying intrusion evolution and elimination in computer networks.pdf 277.5 KB
- MalwareA Future Framework for Device, Network and Service Management.pdf 275.2 KB
- Quantum Malware.pdf 273.4 KB
- Recent Worms A Survey and Trends.pdf 268.2 KB
- Simulating and optimising worm propagation algorithms.pdf 267.7 KB
- PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN P2P NETWORKS.pdf 263.0 KB
- New thoughts in ring3 NT rootkit.pdf 260.4 KB
- Parallels Between Biological and Computer Epidemics.pdf 260.1 KB
- Malware Detection Using Adaptive Data Compression.pdf 256.9 KB
- Marginal Networks The Virus between Complexity and Suppression.pdf 251.7 KB
- RFID Security Issues in Military Supply Chains.pdf 250.3 KB
- Polymorphic Worm Detection Using Structural Information of Executables.pdf 249.9 KB
- On the Performance of Internet Worm Scanning Strategies.pdf 248.7 KB
- New malware distribution methods threaten signature-based AV.pdf 247.5 KB
- Malware comes of age The arrival of the true computer parasite.pdf 243.6 KB
- Sandbox Technology Inside AV Scanners.pdf 240.6 KB
- Modelling Development of Epidemics with Dynamic Small-World Networks.pdf 233.1 KB
- Semantics-Aware Malware Detection.pdf 231.1 KB
- Reflections on Trusting Trust.pdf 219.8 KB
- On the Spread of Viruses on the Internet.pdf 217.7 KB
- Malware Phylogeny Generation using Permutations of Code.pdf 216.9 KB
- N-gram analysis for computer virus detection.pdf 216.5 KB
- Models of Active Worm Defenses.pdf 210.3 KB
- Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection.pdf 209.0 KB
- Securing Instant Messaging.pdf 206.9 KB
- On the Time Complexity of Computer Viruses.pdf 205.6 KB
- Self-Nonself Discrimination in a Computer.pdf 205.0 KB
- SubVirt Implementing malware with virtual machines.pdf 204.5 KB
- On abstract computer virology from a recursion-theoretic perspective.pdf 204.2 KB
- Rebels for the System Virus writers, general intellect, cyberpunk and criminal capitalism.pdf 202.1 KB
- Stay Safe Online Campaign's AntiVirus Presentation.pdf 200.4 KB
- Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis the Bradley Virus.pdf 196.3 KB
- Shield Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits.pdf 195.0 KB
- Monitoring and Early Warning for Internet Worms.pdf 194.9 KB
- Slack Space Sculpting the computer monsters -- virus inspiration.pdf 192.6 KB
- On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf 191.4 KB
- Software Diversity as a Defense Against Viral Propagation Models and Simulations.pdf 190.1 KB
- Rootkits Analysis and Detection.pdf 189.6 KB
- New threats of Java viruses.pdf 182.5 KB
- Stack Shape Analysis to Detect Obfuscated calls in Binaries.pdf 182.0 KB
- On Computer Viral Infection and the Effect of Immunization.pdf 179.8 KB
- On abstract computer virology from a recursion theoretic perspective.pdf 177.6 KB
- Networks, Control, and Life-Forms.pdf 173.7 KB
- Polygraph Automatically Generating Signatures for Polymorphic Worms.pdf 170.8 KB
- Malicious Cryptography Kleptographic Aspects.pdf 167.6 KB
- Open problems in computer virology.pdf 166.7 KB
- Software Vaccine Technique and Its Application in Early Virus Finding and Tracing.pdf 165.2 KB
- On the Semantics of Self-Unpacking Malware Code.pdf 163.9 KB
- MetaAware Identifying Metamorphic Malware.pdf 163.2 KB
- Normalizing Metamorphic Malware Using Term Rewriting.pdf 160.9 KB
- Survey on Malware Detection Methods.pdf 159.1 KB
- Some human dimensions of computer virus creation and infection.pdf 156.4 KB
- Superworms and Cryptovirology a Deadly Combination.pdf 153.5 KB
- Revealing Packed Malware.pdf 153.1 KB
- Seminar Report on Study of Viruses and Worms.pdf 151.7 KB
- Suppressing the spread of email malcode using short-term message recall.pdf 151.0 KB
- Routing Worm A Fast, Selective Attack Worm based on IP Address Information.pdf 149.3 KB
- Network Worms.pdf 149.2 KB
- SirCamstantial Evidence.pdf 148.5 KB
- Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware.pdf 148.0 KB
- On the Effectiveness of Address-Space Randomization.pdf 146.9 KB
- Owning Antivirus.pdf 145.1 KB
- Scary Networks Viruses as Discursive Practice.pdf 144.7 KB
- Malware in Popular Networks.pdf 133.2 KB
- Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf 129.8 KB
- Modeling Virus Propagation in Peer-to-Peer Networks.pdf 129.0 KB
- Potential Threats to WAP Enabled Devices.pdf 128.8 KB
- Managing Computer Viruses in a Groupware Environment.pdf 124.3 KB
- Prosecuting Computer Virus Authors The Need for an Adequate and Immediate International Solution.pdf 121.8 KB
- Self- information systems why not.pdf 119.9 KB
- Mind Wars Attack of the Memes.pdf 119.8 KB
- On behavioral detection.pdf 119.4 KB
- On the definition and classification of cybercrime.pdf 117.3 KB
- On the functional validity of the worm-killing worm.pdf 116.0 KB
- Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf 115.3 KB
- New method of fighting computer viruses announced.pdf 114.8 KB
- Nematodes - Beneficial Worms.pdf 114.0 KB
- Parallel analysis of polymorphic viral code using automated deduction system.pdf 112.8 KB
- Mathematical Viruses.pdf 111.5 KB
- Modular worms.pdf 107.9 KB
- Structuring ethical curricula in the information age.pdf 107.0 KB
- Powerful virus hits computers.pdf 100.3 KB
- Stochastic Features of Computer Viruses.pdf 95.7 KB
- Spyware and Rootkits - The Future Convergence.pdf 93.6 KB
- One-hit models for virus inactivation studies.pdf 91.5 KB
- Mathematical Model of Computer Viruses.pdf 90.2 KB
- Spyware A Little Knowledge is a Wonderful Thing.pdf 88.7 KB
- Reports of computer viruses on the increase.pdf 88.4 KB
- Painting the Internet A Different Kind of Warhol Worm.pdf 84.1 KB
- N-gram-based Detection of New Malicious Code.pdf 83.6 KB
- Mobile Code Threats, Fact or Fiction.pdf 83.2 KB
- Next-Generation Viruses Present New Challenges.pdf 83.1 KB
- Running head REVERSE ENGINEERING MALWARE.pdf 81.1 KB
- Poison Ivy Farmers Virus Collections.pdf 79.9 KB
- Malicious Threats to Personal Digital Assistants.pdf 78.7 KB
- Resolution based metamorphic computer virus detection using redundancy control strategy.pdf 78.7 KB
- Possible Vicarious Liability for Computer Users in the USA.pdf 74.0 KB
- Malware analysis for windows administrators.pdf 72.7 KB
- Simulating Bandwidth-Limited Worms, One Graph to Rule Them All.pdf 72.5 KB
- Prophet and loss.pdf 72.0 KB
- Spyware & Rootkits.pdf 70.8 KB
- Reliable Identification of Bounded-length Viruses is NP-complete.pdf 69.5 KB
- Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf 67.7 KB
- Malicious Data and Computer Security.pdf 63.9 KB
- Real world anti-virus product reviews and evaluations - the current state of affairs.pdf 59.3 KB
- Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen - Thimbleby.pdf 58.5 KB
- Principles of a Computer Immune System.pdf 58.3 KB
- Reductions of the general virus detection problem.pdf 57.2 KB
- Paradise lost.pdf 55.9 KB
- Prescription Medicine.pdf 51.9 KB
- Raised hacklez.pdf 50.0 KB
- Self-Replicating Turing Machines and Computer Viruses.pdf 48.0 KB
- Striking Similarities.pdf 47.2 KB
- Malware.pdf 46.7 KB
- Mostly harmless.pdf 45.6 KB
- Protection of computer systems from computer viruses ethical and practical issues.pdf 43.0 KB
- Slamdunk.pdf 42.5 KB
- Open Problems in Computer Virus Research.pdf 41.7 KB
- Malicious Cryptography Cryptovirology and Kleptography.pdf 41.7 KB
- Not Teaching Viruses and Worms Is Harmful.pdf 39.9 KB
- Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen.pdf 38.9 KB
- Making a hash of things.pdf 38.8 KB
- Something smells fishy.pdf 38.5 KB
- Not worthy.pdf 38.3 KB
- Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf 31.0 KB
- Rootkits - The new wave of invisible malware is here.pdf 30.3 KB
- Nimda Worm Shows You Can't Always Patch Fast Enough.pdf 24.5 KB
- Slackspace.pdf 22.2 KB
- Real-Time Virus Detection System Using iNetmon Engine.pdf 21.2 KB
- Sleep-Inducing.pdf 20.9 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.