Malware

Results: 7286



#Item
971NGFW - Stream Based Malware Detection Es werden nur einzelne Pakete überprüft. Eine Kombination mehrerer Pakete ist aufgrund der erforderlichen Geschwindigkeit nicht möglich - schließlich sollen NGFWs mehrere GBit-Po

NGFW - Stream Based Malware Detection Es werden nur einzelne Pakete überprüft. Eine Kombination mehrerer Pakete ist aufgrund der erforderlichen Geschwindigkeit nicht möglich - schließlich sollen NGFWs mehrere GBit-Po

Add to Reading List

Source URL: www.nrw-units.de

Language: German - Date: 2014-07-31 10:09:02
    972AccessMiner: Using System-Centric Models for Malware Protection Andrea Lanzi Davide Balzarotti

    AccessMiner: Using System-Centric Models for Malware Protection Andrea Lanzi Davide Balzarotti

    Add to Reading List

    Source URL: www.iseclab.org

    Language: English
      973Malwarebytes Anti-Malware Users Guide VersionFebruary 2014  Notices

      Malwarebytes Anti-Malware Users Guide VersionFebruary 2014 Notices

      Add to Reading List

      Source URL: static-cdn.malwarebytes.org

      Language: English
        974Symantec Intelligence  Symantec Intelligence Report: August 2011 Turbulent financial markets trigger a return to stock pump-and-dump spam; Master Boot Record (MBR) malware may be making a comeback

        Symantec Intelligence Symantec Intelligence Report: August 2011 Turbulent financial markets trigger a return to stock pump-and-dump spam; Master Boot Record (MBR) malware may be making a comeback

        Add to Reading List

        Source URL: www.symantec.com

        Language: English - Date: 2011-08-24 04:05:58
          975Rotalum`e: A Tool for Automatic Reverse Engineering of Malware Emulators Monirul Sharif Andrea Lanzi Jonathon Giffin Wenke Lee School of Computer Science, Georgia Institute of Technology {msharif, andrea, giffin, wenke}@

          Rotalum`e: A Tool for Automatic Reverse Engineering of Malware Emulators Monirul Sharif Andrea Lanzi Jonathon Giffin Wenke Lee School of Computer Science, Georgia Institute of Technology {msharif, andrea, giffin, wenke}@

          Add to Reading List

          Source URL: www.iseclab.org

          Language: English
            976Software Updates vs. Web Threats HOW WELL DOES PATCHING SOFTWARE PROTECT AGAINST MALWARE? Dennis Technology Labs www.DennisTechnologyLabs.com Follow @DennisTechLabs on Twitter.com This test explores how far software upda

            Software Updates vs. Web Threats HOW WELL DOES PATCHING SOFTWARE PROTECT AGAINST MALWARE? Dennis Technology Labs www.DennisTechnologyLabs.com Follow @DennisTechLabs on Twitter.com This test explores how far software upda

            Add to Reading List

            Source URL: dennistechnologylabs.com

            Language: English - Date: 2014-10-08 04:30:46
              977Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

              Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

              Add to Reading List

              Source URL: stix.mitre.org

              Language: English
                978Battling the botnets and the zombies BrandProtect puts malware in its place The proliferation of malware is a cause for increasing concern for businesses and consumers. While many instances of malware are little more tha

                Battling the botnets and the zombies BrandProtect puts malware in its place The proliferation of malware is a cause for increasing concern for businesses and consumers. While many instances of malware are little more tha

                Add to Reading List

                Source URL: www.brandprotect.com

                Language: English
                  979An Epidemiological Study of Malware Encounters in a Large Enterprise Ting-Fang Yen Victor Heorhiadi

                  An Epidemiological Study of Malware Encounters in a Large Enterprise Ting-Fang Yen Victor Heorhiadi

                  Add to Reading List

                  Source URL: www.cs.unc.edu

                  Language: English - Date: 2014-11-03 17:46:16
                    980Extremely Scalable Storage and Clustering of Malware Metadata Matthew Asquith About The Author Matthew Asquith graduated from the University of Sydney in 2006 with a Bachelor IT with first-class honours. Since then he ha

                    Extremely Scalable Storage and Clustering of Malware Metadata Matthew Asquith About The Author Matthew Asquith graduated from the University of Sydney in 2006 with a Bachelor IT with first-class honours. Since then he ha

                    Add to Reading List

                    Source URL: www.eicar.org

                    Language: English - Date: 2014-11-18 08:15:14