index-of.es Crespon


Imagen


Icon  Name                                                                                              Size  
[DIR] Parent Directory                                                                                    -   
[   ] SBMDS an interpretable string based malware detection system using SVM ensemble with bagging.pdf  533K  
[   ] SPARSE A Hybrid System to Detect Malcode-Bearing Documents.pdf                                    1.2M  
[   ] Sandbox Technology Inside AV Scanners.pdf                                                         241K  
[   ] Scalable, Behavior-Based Malware Clustering.pdf                                                   462K  
[   ] Scary Networks Viruses as Discursive Practice.pdf                                                 145K  
[   ] Securing Instant Messaging.pdf                                                                    207K  
[   ] Selbstreproduktion bei programmen.pdf                                                              38M  
[   ] Self- information systems why not.pdf                                                             120K  
[   ] Self-Nonself Discrimination in a Computer.pdf                                                     205K  
[   ] Self-Replicating Turing Machines and Computer Viruses.pdf                                          48K  
[   ] Self-reproducing machines.pdf                                                                     315K  
[   ] Semantics-Aware Malware Detection.pdf                                                             231K  
[   ] Seminar Report on Study of Viruses and Worms.pdf                                                  152K  
[   ] Server-based Virus-protection On UnixLinux.pdf                                                    684K  
[   ] Shield -- A First Line Worm Defense.pdf                                                           362K  
[   ] Shield Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits.pdf       195K  
[   ] Should We Teach Virus Writing.pdf                                                                 1.1M  
[   ] Signature Generation and Detection of Malware Families.pdf                                        287K  
[   ] Simulating Bandwidth-Limited Worms, One Graph to Rule Them All.pdf                                 72K  
[   ] Simulating and optimising worm propagation algorithms.pdf                                         268K  
[   ] Simulating malware with MAlSim.pdf                                                                1.4M  
[   ] SinFP, unification of active and passive operating system fingerprinting.pdf                      364K  
[   ] SirCamstantial Evidence.pdf                                                                       148K  
[   ] Slack Space Sculpting the computer monsters -- virus inspiration.pdf                              193K  
[   ] Slackspace.pdf                                                                                     22K  
[   ] Slamdunk.pdf                                                                                       43K  
[   ] Sleep-Inducing.pdf                                                                                 21K  
[   ] Small treatise about e-manipulation for honest people.pdf                                         915K  
[   ] SmartSiren Virus Detection and Alert for Smartphones.pdf                                          509K  
[   ] Sobig, sobigger, sobiggest.pdf                                                                    447K  
[   ] Software Diversity as a Defense Against Viral Propagation Models and Simulations.pdf              190K  
[   ] Software Transformations to Improve Malware Detection.pdf                                         307K  
[   ] Software Vaccine Technique and Its Application in Early Virus Finding and Tracing.pdf             165K  
[   ] Some Further Theoretical Results about Computer Viruses.pdf                                       1.6M  
[   ] Some human dimensions of computer virus creation and infection.pdf                                156K  
[   ] Something smells fishy.pdf                                                                         39K  
[   ] Source Code Analysis of Worms.pdf                                                                 290K  
[   ] Specification and evaluation of polymorphic shellcode properties using a new temporal logic.pdf   786K  
[   ] Spyware & Rootkits.pdf                                                                             71K  
[   ] Spyware A Little Knowledge is a Wonderful Thing.pdf                                                89K  
[   ] Spyware and Rootkits - The Future Convergence.pdf                                                  94K  
[   ] Stack Shape Analysis to Detect Obfuscated calls in Binaries.pdf                                   182K  
[   ] Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf                                  68K  
[   ] Static Analysis of Executables to Detect Malicious Patterns.pdf                                   303K  
[   ] Static Detection of Malicious Code in Executable Programs.pdf                                     792K  
[   ] Static detection and identification of X86 malicious executables A multidisciplinary approach.pdf 688K  
[   ] Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware.pdf     148K  
[   ] Stay Safe Online Campaign's AntiVirus Presentation.pdf                                            200K  
[   ] Stochastic Features of Computer Viruses.pdf                                                        96K  
[   ] Stoned Bootkit.pdf                                                                                1.2M  
[   ] Striking Similarities.pdf                                                                          47K  
[   ] Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis the Bradley Virus.pdf      196K  
[   ] Structuring ethical curricula in the information age.pdf                                          107K  
[   ] Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection.pdf            209K  
[   ] Supervisory control of malicious executables.pdf                                                  463K  
[   ] Superworms and Cryptovirology a Deadly Combination.pdf                                            153K  
[   ] Suppressing the spread of email malcode using short-term message recall.pdf                       151K  
[   ] Survey on Malware Detection Methods.pdf                                                           159K  
[   ] SweetBait Zero-Hour Worm Detection and Containment Using Honeypots.pdf                            210K  
[   ] System Dynamic Model for Computer Virus Prevalance.pdf                                            570K  
[   ] System and method for detecting malicious executable code.pdf                                     163K  


© 2013-2017 - index-of.es


email feed