Malware

Results: 7286



#Item
151A P P L I C AT I O N M A N AG E R FO R S CC M : DATA S H E E T  Reduce Endpoint Security Risk and Control Application Use Block Malware and Ransomware, Enforce License Agreements, and Control End User Privileges

A P P L I C AT I O N M A N AG E R FO R S CC M : DATA S H E E T Reduce Endpoint Security Risk and Control Application Use Block Malware and Ransomware, Enforce License Agreements, and Control End User Privileges

Add to Reading List

Source URL: rs.shavlik.com

- Date: 2016-10-07 11:40:25
    152PRODUCTINFORMATIE  G DATA ANTIVIRUS DE BASISBEVEILIGING TEGEN VIRUSSEN EN ANDERE MALWARE

    PRODUCTINFORMATIE G DATA ANTIVIRUS DE BASISBEVEILIGING TEGEN VIRUSSEN EN ANDERE MALWARE

    Add to Reading List

    Source URL: file.gdatasoftware.com

    - Date: 2016-01-11 05:54:34
      153GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

      GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

      Add to Reading List

      Source URL: media.blackhat.com

      - Date: 2012-04-07 14:52:47
        154D REBIN: Effective and Explainable Detection of Android Malware in Your Pocket Daniel Arp1 , Michael Spreitzenbarth2 , Malte H¨ubner1 , Hugo Gascon1 , Konrad Rieck1 1  University of G¨ottingen

        D REBIN: Effective and Explainable Detection of Android Malware in Your Pocket Daniel Arp1 , Michael Spreitzenbarth2 , Malte H¨ubner1 , Hugo Gascon1 , Konrad Rieck1 1 University of G¨ottingen

        Add to Reading List

        Source URL: filepool.informatik.uni-goettingen.de

        - Date: 2015-05-08 05:06:14
          155Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

          Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

          Add to Reading List

          Source URL: www.necoma-project.eu

          - Date: 2014-04-25 08:04:21
            156Microsoft Word - Trustwave - ATM Malware Analysis Briefing - June

            Microsoft Word - Trustwave - ATM Malware Analysis Briefing - June

            Add to Reading List

            Source URL: regmedia.co.uk

            - Date: 2009-06-03 15:05:53
              157Research  How to interpret networkbased malware detection The impact of malware acquisition and processing on network detection and threat classification systems By Günter Ollmann

              Research How to interpret networkbased malware detection The impact of malware acquisition and processing on network detection and threat classification systems By Günter Ollmann

              Add to Reading List

              Source URL: www.vectranetworks.com

              - Date: 2016-07-08 13:34:24
                158PRACTICAL MALWARE ANALYSIS Kris Kendall  WHY PERFORM MALWARE ANALYSIS? What are some of the reasons that one might want to invest the (sometimes significant)

                PRACTICAL MALWARE ANALYSIS Kris Kendall WHY PERFORM MALWARE ANALYSIS? What are some of the reasons that one might want to invest the (sometimes significant)

                Add to Reading List

                Source URL: www.blackhat.com

                - Date: 2015-05-28 15:51:25
                  159I Got a Letter From the Government the Other Day... Unveiling a Campaign of Intimidation, Kidnapping, and Malware in Kazakhstan Eva Galperin, International Policy Analyst, EFF Cooper Quintin, Staff Technologist, EFF

                  I Got a Letter From the Government the Other Day... Unveiling a Campaign of Intimidation, Kidnapping, and Malware in Kazakhstan Eva Galperin, International Policy Analyst, EFF Cooper Quintin, Staff Technologist, EFF

                  Add to Reading List

                  Source URL: www.eff.org

                  - Date: 2016-08-04 02:52:15
                    160MADAM: A Multi Level Anomaly Detector for Android Malware Fabio Martinelli National Research Council of Italy (CNR) Joint work with Andrea Saracino, Daniele Sgandurra et al.

                    MADAM: A Multi Level Anomaly Detector for Android Malware Fabio Martinelli National Research Council of Italy (CNR) Joint work with Andrea Saracino, Daniele Sgandurra et al.

                    Add to Reading List

                    Source URL: comsec.spb.ru

                    - Date: 2015-12-03 06:47:11