搜索资源列表
Network_Security
- Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worms
5
- Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malw
Introduction-to-File-Infection-Techniques
- This paper was written within the scope of the author´ s own learning process, during her studies of computer science and on the basis of her own malware analyses. It was published in order to offer an introduction to several file infection t
SyScan2013_DAY1_SPEAKER03_Nguyen_Anh_Quynh_Optico
- OptiCode: Machine Code Deobfuscation for Malware Analysis Nguyen Anh Quynh, COSEINC <aquynh -at- gmail.com> Syscan Singapore 2013, April 25th
360toolstck
- 三百六杀毒防*和*恶意软件....希望可以帮到大家-Three hundred sixty anti-virus plug-and trojan malware .... hope you can help us
auto-reversing-of-mal-emulator
- Malware authors have recently begun using emulation technology to obfuscate their code.In this paper, we present the first work in automatic reverse engineering of malware emulators.-Automatic Reverse Engineering of Malware Emulators
ClusterMalwareWithKmeans
- Partitional Clustering of Malware using K-Means
goddless-mobile-malware-uses-multiple-exploits-to
- goddless mobile device security
web-malware
- Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead