Name Size
Parent Directory -
RFID Security Issues in Military Supply Chains.pdf 250K
Raised hacklez.pdf 50K
Real world anti-virus product reviews and evaluations - the current state of affairs.pdf 59K
Real-Time Virus Detection System Using iNetmon Engine.pdf 21K
Rebels for the System Virus writers, general intellect, cyberpunk and criminal capitalism.pdf 202K
Recent Worms A Survey and Trends.pdf 268K
Reductions of the general virus detection problem.pdf 57K
Reflections on Trusting Trust.pdf 220K
Reliable Identification of Bounded-length Viruses is NP-complete.pdf 70K
Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen.pdf 39K
Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen - Thimbleby.pdf 59K
Reports of computer viruses on the increase.pdf 88K
Research in Computer Viruses and Worms.pdf 349K
Resolution based metamorphic computer virus detection using redundancy control strategy.pdf 79K
Response to the Proposal for a Virus database.pdf 296K
Revealing Packed Malware.pdf 153K
Reverse Code Engineering An In-Depth Analysis of the Bagle Virus.pdf 1.2M
Reverse Engineering Malware.pdf 351K
Rogue Computer Programs.pdf 4.3M
Rootkit Hunting vs. Compromise Detection.pdf 340K
Rootkits - Detection and prevention.pdf 930K
Rootkits - The new wave of invisible malware is here.pdf 30K
Rootkits Analysis and Detection.pdf 190K
Rotalum A Tool for Automatic Reverse Engineering of Malware Emulators.pdf 1.5M
Routing Worm A Fast, Selective Attack Worm based on IP Address Information.pdf 149K
Running head REVERSE ENGINEERING MALWARE.pdf 81K