Malware

Results: 7286



#Item
931Metadata-driven Threat Classification of Network Endpoints Appearing in Malware Andrew G. West and Aziz Mohaisen (Verisign Labs) July 11, 2014 – DIMVA – Egham, United Kingdom  PRELIMINARY OBSERVATIONS

Metadata-driven Threat Classification of Network Endpoints Appearing in Malware Andrew G. West and Aziz Mohaisen (Verisign Labs) July 11, 2014 – DIMVA – Egham, United Kingdom PRELIMINARY OBSERVATIONS

Add to Reading List

Source URL: www.andrew-g-west.com

Language: English - Date: 2014-07-27 21:24:28
932simpliFiRE.IDAscope An IDA Pro extension for easier (malware) reverse engineering Daniel Plohmann, Alexander Hanel

simpliFiRE.IDAscope An IDA Pro extension for easier (malware) reverse engineering Daniel Plohmann, Alexander Hanel

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2012-10-24 08:11:38
    933RedSocks Malware Threat Defender Endpoint threat detection When it comes to Malware and Advanced Persistent Threat (APT) protection, many organizations have a false sense of security. They believe they have secured their

    RedSocks Malware Threat Defender Endpoint threat detection When it comes to Malware and Advanced Persistent Threat (APT) protection, many organizations have a false sense of security. They believe they have secured their

    Add to Reading List

    Source URL: www.redsocks.nl

    Language: English - Date: 2016-01-25 04:02:34
      934Concurrent Architecture for Automated Malware Classification

      Concurrent Architecture for Automated Malware Classification

      Add to Reading List

      Source URL: daly.axiom-developer.org

      Language: English - Date: 2011-03-02 21:54:27
        935Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition Yasutaka Shindo Akihiro Satoh

        Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition Yasutaka Shindo Akihiro Satoh

        Add to Reading List

        Source URL: conferences2.sigcomm.org

        Language: English - Date: 2014-12-01 17:07:18
        936Malware Trend Report, Q1 2015 January | February | March April 2015 Copyright RedSocks B.V. © All Rights Reserved.

        Malware Trend Report, Q1 2015 January | February | March April 2015 Copyright RedSocks B.V. © All Rights Reserved.

        Add to Reading List

        Source URL: www.redsocks.nl

        Language: English - Date: 2016-01-25 04:02:43
          937D&D of malware with exotic C&C D&D = Description & Detection C&C = Command & Control Automotive

          D&D of malware with exotic C&C D&D = Description & Detection C&C = Command & Control Automotive

          Add to Reading List

          Source URL: archive.hack.lu

          Language: English - Date: 2014-10-23 09:41:47
            938Powerful anti-malware defense  Because your current antivirus solution alone can’t protect your network As cyber attacks increase in frequency and sophistication, IT managers are starting to realize that relying on onl

            Powerful anti-malware defense Because your current antivirus solution alone can’t protect your network As cyber attacks increase in frequency and sophistication, IT managers are starting to realize that relying on onl

            Add to Reading List

            Source URL: es.malwarebytes.org

            Language: English
              939Powerful multi-layered defense delivers smart endpoint protection.  Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one pow

              Powerful multi-layered defense delivers smart endpoint protection. Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one pow

              Add to Reading List

              Source URL: ru.malwarebytes.org

              Language: English
                940Systematic Mining of Associated Server Herds for Malware Campaign Discovery Jialong Zhang Sabyasachi Saha∗ Guofei Gu Sung-Ju Lee∗ Marco Mellia

                Systematic Mining of Associated Server Herds for Malware Campaign Discovery Jialong Zhang Sabyasachi Saha∗ Guofei Gu Sung-Ju Lee∗ Marco Mellia

                Add to Reading List

                Source URL: faculty.cs.tamu.edu

                Language: English - Date: 2015-07-01 22:09:28