×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [detection of malware]
Technology
(2013) similarity metric method of obfuscated malware using function call graph
795 views
Documents
Windows Malware Fingerprinting_McVey-1
69 views
Documents
Software Development Security. 2 Understand software-based security controls Understand the software development and change/maintenance processes Specialized
218 views
Documents
Cellphone and Mobile Device Forensics An update on concepts
33 views
Documents
Cellphone and Mobile Device Forensics An update on concepts Presented by Peter L. Fryer ACE, CFE, CISA, MPSC
216 views
Documents
Cellphone and Mobile Device Forensics An update on concepts
34 views