×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ultrauploader documents
Documents
Advanced code evolution techniques and computer virus generator kits
Documents
Advanced fuzzing in the vo ip space
Documents
Advanced metamorphic techniques in computer viruses
Documents
Advanced polymorphic techniques
Documents
An efficient control of virus propagation
Documents
An epidemic model of mobile phone virus
Documents
An epidemiological model of virus spread and cleanup
Documents
An approach towards disassembly of malicious binary executables
Documents
An architecture for generating semantic aware signatures
Documents
Agisa towards automatic generation of infection signatures
Documents
Algebraic specification of computer viruses and their environments
Documents
Adequacy of checksum algorithms for computer virus detection
Documents
Advanced routing worm and its security challenges
Documents
An abstract theory of computer viruses
Documents
An effective architecture and algorithm for detecting worms with various scan techniques
Documents
Blended attacks exploits, vulnerabilities and buffer overflow techniques in computer viruses
Documents
Binary obfuscation using signals
Documents
A method for detecting obfuscated calls in malicious binaries
Documents
Analysis and detection of metamorphic computer viruses
Documents
Automatic comparison of malware
Documents
A parallel string matching engine for use in high speed network intrusion detection systems
< Prev
Next >