CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 搜索资源 - Malware

搜索资源列表

  1. Network_Security

    0下载:
  2. Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worms
  3. 所属分类:软件工程

    • 发布日期:2008-10-13
    • 文件大小:1.45mb
    • 提供者:whr
  1. Malware

    1下载:
  2. 计算机病毒讲座,英文的,一个老外讲的,很好的资料。-Computer viruses lectures, in English, a foreign-speaking, and good information.
  3. 所属分类:Document

    • 发布日期:2015-10-11
    • 文件大小:18.94kb
    • 提供者:*
  1. 5

    0下载:
  2. Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malw
  3. 所属分类:software engineering

    • 发布日期:2017-04-04
    • 文件大小:331.88kb
    • 提供者:oulding
  1. Introduction-to-File-Infection-Techniques

    0下载:
  2. This paper was written within the scope of the author´ s own learning process, during her studies of computer science and on the basis of her own malware analyses. It was published in order to offer an introduction to several file infection t
  3. 所属分类:software engineering

    • 发布日期:2017-03-22
    • 文件大小:393.87kb
    • 提供者:kgch
  1. AMC

    0下载:
  2. Malware Classifer J48 Decision Tr-Malware Classifer J48 Decision Tree
  3. 所属分类:Development Research

    • 发布日期:2017-03-30
    • 文件大小:5.58kb
    • 提供者:Shahzad
  1. SyScan2013_DAY1_SPEAKER03_Nguyen_Anh_Quynh_Optico

    0下载:
  2. OptiCode: Machine Code Deobfuscation for Malware Analysis Nguyen Anh Quynh, COSEINC <aquynh -at- gmail.com> Syscan Singapore 2013, April 25th
  3. 所属分类:software engineering

    • 发布日期:2017-04-02
    • 文件大小:287.34kb
    • 提供者:solidsnake
  1. 2

    0下载:
  2. Volume issue 2013 [doi 10.1145_2513228.2513294] K. Han J. H. Lim E. G. Im -- Malware analysis method using visualization of binary files.pdf- Volume issue 2013 [doi 10.1145_2513228.2513294] K. Han J. H. Lim E. G. Im -- Malware analysis method usin
  3. 所属分类:Development Research

    • 发布日期:2017-05-07
    • 文件大小:1.25mb
    • 提供者:unknown2
  1. 360toolstck

    0下载:
  2. 三百六杀毒防*和*恶意软件....希望可以帮到大家-Three hundred sixty anti-virus plug-and trojan malware .... hope you can help us
  3. 所属分类:software engineering

    • 发布日期:2017-05-03
    • 文件大小:646.97kb
    • 提供者:sam
  1. auto-reversing-of-mal-emulator

    0下载:
  2. Malware authors have recently begun using emulation technology to obfuscate their code.In this paper, we present the first work in automatic reverse engineering of malware emulators.-Automatic Reverse Engineering of Malware Emulators
  3. 所属分类:software engineering

    • 发布日期:2017-05-04
    • 文件大小:1013.46kb
    • 提供者:userasp
  1. ClusterMalwareWithKmeans

    0下载:
  2. Partitional Clustering of Malware using K-Means
  3. 所属分类:software engineering

    • 发布日期:2017-04-30
    • 文件大小:498.52kb
    • 提供者:vivek
  1. Sun

    0下载:
  2. Malware Packer Analysis Using Information Theory and Statistical Methods
  3. 所属分类:Development Research

    • 发布日期:2017-06-01
    • 文件大小:13.02mb
    • 提供者:Victor
  1. goddless-mobile-malware-uses-multiple-exploits-to

    0下载:
  2. goddless mobile device security
  3. 所属分类:software engineering

    • 发布日期:2017-05-04
    • 文件大小:301.65kb
    • 提供者:john
  1. web-malware

    0下载:
  2. Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead
  3. 所属分类:software engineering

    • 发布日期:2017-05-04
    • 文件大小:364.57kb
    • 提供者:Maddy
  1. Chapter 0-1

    0下载:
  2. Malware Analysis book is a guide to do reverse engineering malware
  3. 所属分类:文章/文档

    • 发布日期:2017-12-22
    • 文件大小:349kb
    • 提供者:candylo
  1. Chapter 2-3

    0下载:
  2. Malware Analysis book is a guide to do reverse engineering malware 2
  3. 所属分类:文章/文档

    • 发布日期:2017-12-24
    • 文件大小:975kb
    • 提供者:candylo
  1. Chapter 4-5

    0下载:
  2. Malware Analysis book is a guide to do reverse engineering malware 3
  3. 所属分类:文章/文档

    • 发布日期:2017-12-20
    • 文件大小:964kb
    • 提供者:candylo
  1. Chapter 6-7

    0下载:
  2. Malware Analysis book is a guide to do reverse engineering malware 4
  3. 所属分类:文章/文档

    • 发布日期:2017-12-20
    • 文件大小:615kb
    • 提供者:candylo
  1. Chapter 8-9

    0下载:
  2. Malware Analysis book is a guide to do reverse engineering malware 5
  3. 所属分类:文章/文档

    • 发布日期:2017-12-22
    • 文件大小:1.46mb
    • 提供者:candylo
  1. Chapter 10-11

    0下载:
  2. Malware Analysis book is a guide to do reverse engineering malware 6
  3. 所属分类:文章/文档

    • 发布日期:2017-12-22
    • 文件大小:473kb
    • 提供者:candylo
  1. kuzzle

    0下载:
  2. “Kuzzle”通过篡改电脑系统中的主引导记录(MBR)和卷引导记录(VBR),在不修复主引导区情况下,用户即使重装系统也无法根除。火绒工程师表示,近几年,通过MBR、VBR感染进行深度技术对抗的病毒和流氓软件逐渐增多,流氓软件已完全病毒化,越来越多的使用病毒技术,其手段强劲、性质恶劣,对用户的危害甚至超过传统病毒。("Kuzzle" can tamper with the main boot record (MBR) and volume boot record (VBR)
  3. 所属分类:文章/文档

    • 发布日期:2018-04-22
    • 文件大小:3.3mb
    • 提供者:lyc458216
搜珍网 www.dssz.com