nnt.es


Imagen


Icon  Name                                                                                                             Last modified      Size  Description
[   ] 64-bit rugrats.pdf                                                                                               12-Aug-2017 08:45   30K  
[   ] A Bypass of Cohen's Impossibility Result.pdf                                                                     12-Aug-2017 08:45  107K  
[   ] A Classification of Viruses through Recursion Theorems.pdf                                                       12-Aug-2017 08:45  157K  
[   ] A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed.pdf                              12-Aug-2017 08:45  1.0M  
[   ] A Computational Model of Computer Virus Propagation.pdf                                                          12-Aug-2017 08:45   14K  
[   ] A Computer Virus Is A Thought Manifested.pdf                                                                     12-Aug-2017 08:45  5.6K  
[   ] A Cooperative Immunization System for an Untrusting Internet.pdf                                                 12-Aug-2017 08:45   75K  
[   ] A Cost Analysis of Typical Computer Viruses and Defenses.pdf                                                     12-Aug-2017 08:45   91K  
[   ] A Critical Look at the Regulation of Computer Viruses.pdf                                                        12-Aug-2017 08:45   96K  
[   ] A Distributed Approach against Computer Viruses Inspired by the Immune System.pdf                                12-Aug-2017 08:45  509K  
[   ] A Dozen Dangerous Myths About Computer Viruses.pdf                                                               12-Aug-2017 08:45  109K  
[   ] A Failure to Learn from the Past.pdf                                                                             12-Aug-2017 08:45   95K  
[   ] A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows.pdf                                  12-Aug-2017 08:45  320K  
[   ] A Feature Selection and Evaluation Scheme for Computer Virus Detection.pdf                                       12-Aug-2017 08:45  230K  
[   ] A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.pdf                        12-Aug-2017 08:46  139K  
[   ] A Formal Definition of Computer Worms and Some Related Results.pdf                                               12-Aug-2017 08:46  1.1M  
[   ] A Framework for Deception.pdf                                                                                    12-Aug-2017 08:46  2.7M  
[   ] A Framework to Detect Novel Computer Viruses via System Calls.pdf                                                12-Aug-2017 08:46  311K  
[   ] A Generic Virus Detection Agent on the Internet.pdf                                                              12-Aug-2017 08:46  560K  
[   ] A Generic Virus Scanner in C++.pdf                                                                               12-Aug-2017 08:46   96K  
[   ] A History Of Computer Viruses - Introduction.pdf                                                                 12-Aug-2017 08:46  373K  
[   ] A History Of Computer Viruses - The Famous `Trio'.pdf                                                            12-Aug-2017 08:46  1.3M  
[   ] A History Of Computer Viruses - Three Special Viruses.pdf                                                        12-Aug-2017 08:46  790K  
[   ] A Hybrid Model to Detect Malicious Executables.pdf                                                               12-Aug-2017 08:46  246K  
[   ] A Hygiene Lesson.pdf                                                                                             12-Aug-2017 08:46  212K  
[   ] A Mathematical Theory for the Spread of Computer Viruses.pdf                                                     12-Aug-2017 08:46  400K  
[   ] A Memory Symptom-based Virus Detection Approach.pdf                                                              12-Aug-2017 08:46  167K  
[   ] A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf                                                12-Aug-2017 08:46  1.3M  
[   ] A Methodology to Detect and Characterize Kernel Level Rootkit Exploits.pdf                                       12-Aug-2017 08:46  266K  
[   ] A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations.pdf                         12-Aug-2017 08:46  338K  
[   ] A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf                                 12-Aug-2017 08:46  164K  
[   ] A Network Worm Vaccine Architecture.pdf                                                                          12-Aug-2017 08:46   71K  
[   ] A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS.pdf                                                     12-Aug-2017 08:46  715K  
[   ] A Pact with the Devil.pdf                                                                                        12-Aug-2017 08:46  106K  
[   ] A Plague of Viruses Biological, Computer and Marketing.pdf                                                       12-Aug-2017 08:46  133K  
[   ] A Potency Relation for Worms and Next-Generation Attack Tools.pdf                                                12-Aug-2017 08:46  282K  
[   ] A Proposed Taxonomy of Software Weapons.pdf                                                                      12-Aug-2017 08:46  657K  
[   ] A Public Health Approach to Preventing Malware Propagation.pdf                                                   12-Aug-2017 08:46  708K  
[   ] A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig.pdf                                12-Aug-2017 08:46   12K  
[   ] A Retrovirus Inspired Algorithm for Virus Detection & Optimization.pdf                                           12-Aug-2017 08:46  343K  
[   ] A Self-reproducing Analogue.pdf                                                                                  12-Aug-2017 08:46  304K  
[   ] A Semantics-Based Approach to Malware Detection.pdf                                                              12-Aug-2017 08:46  344K  
[   ] A Sense of 'Danger' for Windows Processes.pdf                                                                    12-Aug-2017 08:46  274K  
[   ] A Sense of Self for Unix Processes.pdf                                                                           12-Aug-2017 08:46   68K  
[   ] A Short Course on Computer Viruses.pdf                                                                           12-Aug-2017 08:46  715K  
[   ] A Short Visit to the Bot Zoo.pdf                                                                                 12-Aug-2017 08:46  742K  
[   ] A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses.pdf                                    12-Aug-2017 08:46  226K  
[   ] A Study of Detecting Computer Viruses in Real-Infected Files.pdf                                                 12-Aug-2017 08:46  175K  
[   ] A Study of Malcode-Bearing Documents.pdf                                                                         12-Aug-2017 08:46  1.1M  
[   ] A Survey of Cryptologic Issues in Computer Virology.pdf                                                          12-Aug-2017 08:46  271K  
[   ] A Taxonomy of Computer Worms.pdf                                                                                 12-Aug-2017 08:46  100K  
[   ] A Technique for Removing an Important Class of Trojan Horses from High Order Languages.pdf                       12-Aug-2017 08:46   84K  
[   ] A Theoretical Superworm.pdf                                                                                      12-Aug-2017 08:46  310K  
[   ] A Tour of the Worm.pdf                                                                                           12-Aug-2017 08:46   70K  
[   ] A Trust System Based on Multi Level Virus Detection.pdf                                                          12-Aug-2017 08:46  193K  
[   ] A Virtual Honeypot Framework.pdf                                                                                 12-Aug-2017 08:46  451K  
[   ] A Web-Based Network Worm Simulator.pdf                                                                           12-Aug-2017 08:46  145K  
[   ] A Worst-Case Worm.pdf                                                                                            12-Aug-2017 08:46   66K  
[   ] A bit of viral protection is worth a megabyte of cure.pdf                                                        12-Aug-2017 08:45  417K  
[   ] A fault tolerance approach to computer viruses.pdf                                                               12-Aug-2017 08:45  680K  
[   ] A framework for modelling trojans and computer virus infection.pdf                                               12-Aug-2017 08:46  228K  
[   ] A general definition of malware.pdf                                                                              12-Aug-2017 08:46  407K  
[   ] A method to detect metamorphic computer viruses.pdf                                                              12-Aug-2017 08:46  2.4M  
[   ] A note on Cohen's formal model for computer viruses.pdf                                                          12-Aug-2017 08:46  182K  
[   ] A parallel String Matching Engine for use in high speed network intrusion detection systems.pdf                  12-Aug-2017 08:46  375K  
[   ] A pilot study on college student's attitudes toward computer virus.pdf                                           12-Aug-2017 08:46   74K  
[   ] A software authentication system for the prevention of computer viruses.pdf                                      12-Aug-2017 08:46  379K  
[   ] A statistical model for undecidable viral detection.pdf                                                          12-Aug-2017 08:46  276K  
[   ] A study of anti-virus' response to unknown threats.pdf                                                           12-Aug-2017 08:46  142K  
[   ] A theoretical model of differential social attributions toward computing technology.pdf                          12-Aug-2017 08:46  425K  
[   ] A unified prediction of computer virus spread in connected networks.pdf                                          12-Aug-2017 08:46  163K  
[   ] A week is a long time in computer ethics.pdf                                                                     12-Aug-2017 08:46   66K  
[   ] ACPI and SMI handlers some limits to trusted computing.pdf                                                       12-Aug-2017 08:46  1.4M  
[   ] AGISA Towards Automatic Generation of Infection Signatures.pdf                                                   12-Aug-2017 08:46  288K  
[   ] API Win32 ancestrales pour Chevaux de Troie hyper furtifs.pdf                                                    12-Aug-2017 08:46  408K  
[   ] ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETECTORS.pdf                                                         12-Aug-2017 08:46   72K  
[   ] ARTISTA A Network for ARTifical Immune SysTems.pdf                                                               12-Aug-2017 08:46  391K  
[   ] ASM-based Modelling of Self-Replicating Programs.pdf                                                             12-Aug-2017 08:46   93K  
[   ] AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION.pdf                                                      12-Aug-2017 08:46   82K  
[   ] Abstract Detection of Computer Viruses.pdf                                                                       12-Aug-2017 08:46  163K  
[   ] Abstraction-Based Intrusion Detection In Distributed Environments.pdf                                            12-Aug-2017 08:46  577K  
[   ] Abstracts of Recent Articles and Literature.pdf                                                                  12-Aug-2017 08:46   98K  
[   ] Accurately Detecting Source Code of Attacks That Increase Privilege.pdf                                          12-Aug-2017 08:46  139K  
[   ] Acquisition of Malicious Code Using Active Learning.pdf                                                          12-Aug-2017 08:46  155K  
[   ] Adequacy of Checksum Algorithms for Computer Virus Detection.pdf                                                 12-Aug-2017 08:46  236K  
[   ] Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf                                         12-Aug-2017 08:46  581K  
[   ] Advanced Metamorphic Techniques in Computer Viruses.pdf                                                          12-Aug-2017 08:46  311K  
[   ] Advanced Polymorphic Techniques.pdf                                                                              12-Aug-2017 08:46  532K  
[   ] Advanced Routing Worm and Its Security Challenges.pdf                                                            12-Aug-2017 08:46  228K  
[   ] Advanced fuzzing in the VoIP space.pdf                                                                           12-Aug-2017 08:46  504K  
[   ] Algebraic Specification of Computer Viruses and Their Environments.pdf                                           12-Aug-2017 08:46  162K  
[   ] An Abstract Theory of Computer Viruses.pdf                                                                       12-Aug-2017 08:46  730K  
[   ] An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code.pdf          12-Aug-2017 08:46   67K  
[   ] An Approach to Containing Computer Viruses.pdf                                                                   12-Aug-2017 08:46  1.0M  
[   ] An Approach towards Disassembly of Malicious Binary Executables.pdf                                              12-Aug-2017 08:46  1.4M  
[   ] An Architecture for Generating Semantic-Aware Signatures.pdf                                                     12-Aug-2017 08:46  263K  
[   ] An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques.pdf                     12-Aug-2017 08:46  607K  
[   ] An Efficient Control of Virus Propagation.pdf                                                                    12-Aug-2017 08:46  189K  
[   ] An Email Worm Vaccine Architecture.pdf                                                                           12-Aug-2017 08:46  213K  
[   ] An Epidemic Model of Mobile Phone Virus.pdf                                                                      12-Aug-2017 08:46   49K  
[   ] An Epidemiological View of Worms and Viruses.pdf                                                                 12-Aug-2017 08:46  142K  
[   ] An Evaluation of Two Host Based Intrusion Prevention Systems.pdf                                                 12-Aug-2017 08:46  171K  
[   ] An Internet-Worm Early Warning System.pdf                                                                        12-Aug-2017 08:46   81K  
[   ] An Introduction to Computer Viruses.pdf                                                                          12-Aug-2017 08:46   38K  
[   ] An Introduction to Intrusion-Detection Systems.pdf                                                               12-Aug-2017 08:46  196K  
[   ] An OS Independent Heuristics-based Worm-containment System.pdf                                                   12-Aug-2017 08:46  159K  
[   ] An Overview of Computer Viruses in a Research Environment.pdf                                                    12-Aug-2017 08:46   72K  
[   ] An Overview of Unix Rootkits.pdf                                                                                 12-Aug-2017 08:46  403K  
[   ] An Undetectable Computer Virus.pdf                                                                               12-Aug-2017 08:46   33K  
[   ] An epidemiological model of virus spread and cleanup.pdf                                                         12-Aug-2017 08:46  150K  
[   ] Analysis and Detection of Computer Viruses and Worms.pdf                                                         12-Aug-2017 08:46  652K  
[   ] Analysis and detection of metamorphic computer viruses.pdf                                                       12-Aug-2017 08:46  932K  
[   ] Analysis of Virus Algorithms.pdf                                                                                 12-Aug-2017 08:46   69K  
[   ] Analysis of Web Application Worms and Viruses.pdf                                                                12-Aug-2017 08:46  589K  
[   ] Analysis of a scanning model of worm propagation.pdf                                                             12-Aug-2017 08:46  397K  
[   ] Analysis of rxbot.pdf                                                                                            12-Aug-2017 08:46  816K  
[   ] Analyzing Worms and Network Traffic using Compression.pdf                                                        12-Aug-2017 08:46  196K  
[   ] Anatomy of a Semantic Virus.pdf                                                                                  12-Aug-2017 08:46  306K  
[   ] Ani-hilate this week.pdf                                                                                         12-Aug-2017 08:46   64K  
[   ] Anomalous Payload-based Network Intrusion Detection.pdf                                                          12-Aug-2017 08:46  285K  
[   ] Anomalous Payload-based Worm Detection and Signature Generation.pdf                                              12-Aug-2017 08:46  279K  
[   ] Anonymous and Malicious.pdf                                                                                      12-Aug-2017 08:46  248K  
[   ] Anti-Disassembly using Cryptographic Hash Functions.pdf                                                          12-Aug-2017 08:46  162K  
[   ] Anti-Forensics The Rootkit Connection.pdf                                                                        12-Aug-2017 08:46  596K  
[   ] Anti-Malware Tools Intrusion Detection Systems.pdf                                                               12-Aug-2017 08:46  893K  
[   ] Anti-Spyware Coalition Definitions and Supporting Documents.pdf                                                  12-Aug-2017 08:46  274K  
[   ] Anti-Virus Product Evaluation in the Real World.pdf                                                              12-Aug-2017 08:46   57K  
[   ] Anti-Virus in the Corporate Arena.pdf                                                                            12-Aug-2017 08:46   90K  
[   ] Antivirus Software Testing for the New Millenium.pdf                                                             12-Aug-2017 08:46   53K  
[   ] Antivirus update reaction times of major antivirus vendors.pdf                                                   12-Aug-2017 08:46  232K  
[   ] Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware.pdf               12-Aug-2017 08:46  111K  
[   ] Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection.pdf          12-Aug-2017 08:46  377K  
[   ] Applications of Genetic Algorithms to Malware Detection and Creation.pdf                                         12-Aug-2017 08:46  144K  
[   ] Applications of Immune System Computing.pdf                                                                      12-Aug-2017 08:46  606K  
[   ] Applied parallel coordinates for logs and network traffic attack analysis.pdf                                    12-Aug-2017 08:46  2.9M  
[   ] Approaches to Integrated Malware Detection and Avoidance.pdf                                                     12-Aug-2017 08:46   62K  
[   ] Approaching Zero - The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals.pdf 12-Aug-2017 08:46  2.0M  
[   ] Architecture of a Morphological Malware Detector.pdf                                                             12-Aug-2017 08:46  787K  
[   ] Are Computer Hacker Break-ins Ethical.pdf                                                                        12-Aug-2017 08:46   44K  
[   ] Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection.pdf                                  12-Aug-2017 08:46   90K  
[   ] Are Handheld Viruses a Significant Threat.pdf                                                                    12-Aug-2017 08:46  117K  
[   ] Are Metamorphic Viruses Really Invincible.pdf                                                                    12-Aug-2017 08:46  343K  
[   ] Are computer viruses spread by the media.pdf                                                                     12-Aug-2017 08:46  3.9K  
[   ] Are current antivirus programs able to detect complex metamorphic malware An empirical evaluation.pdf            12-Aug-2017 08:46  941K  
[   ] Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited.pdf             12-Aug-2017 08:46  229K  
[   ] Artificial Immune System against Viral Attack.pdf                                                                12-Aug-2017 08:46  342K  
[   ] Artificial Immune Systems and the Grand Challenge for Non-Classical Computation.pdf                              12-Aug-2017 08:46  213K  
[   ] As Japanese Bring Work Home, Virus Hitches a Ride.pdf                                                            12-Aug-2017 08:46  202K  
[   ] Attack of the Clones.pdf                                                                                         12-Aug-2017 08:46   39K  
[   ] Attack of the killer virus!.pdf                                                                                  12-Aug-2017 08:46   79K  
[   ] Attack of the quantum worms.pdf                                                                                  12-Aug-2017 08:46  410K  
[   ] Attacking Antivirus.pdf                                                                                          12-Aug-2017 08:46  260K  
[   ] Attitude Adjustment Trojans and Malware on the Internet.pdf                                                      12-Aug-2017 08:46  207K  
[   ] Auto-Sign an automatic signature generator for high-speed malware filtering devices.pdf                          12-Aug-2017 08:46  586K  
[   ] Autoimmune computer virus.pdf                                                                                    12-Aug-2017 08:46  187K  
[   ] Automated Classification and Analysis of Internet Malware.pdf                                                    12-Aug-2017 08:46  489K  
[   ] Automated Defense from Rootkit Attacks.pdf                                                                       12-Aug-2017 08:46  193K  
[   ] Automated Malware Invariant Generation.pdf                                                                       12-Aug-2017 08:46  176K  
[   ] Automated Web Patrol with Strider HoneyMonkeys Finding Web Sites That Exploit Browser Vulnerabilities.pdf        12-Aug-2017 08:46  618K  
[   ] Automated Worm Fingerprinting.pdf                                                                                12-Aug-2017 08:46  547K  
[   ] Automatic Comparison of Malware.pdf                                                                              12-Aug-2017 08:46  1.1M  
[   ] Automatic Extraction of Computer Virus Signatures.pdf                                                            12-Aug-2017 08:46  622K  
[   ] Automatic Reverse Engineering of Malware Emulators.pdf                                                           12-Aug-2017 08:46  1.4M  
[   ] Automatic Static Unpacking of Malware Binaries.pdf                                                               12-Aug-2017 08:46  142K  
[   ] Automatic binary deobfuscation.pdf                                                                               12-Aug-2017 08:46  1.8M  
[   ] Automatically Generating Signatures for Polymorphic Worms.pdf                                                    12-Aug-2017 08:47  171K  
[   ] Avoiding Windows Rootkit Detection.pdf                                                                           12-Aug-2017 08:47  106K  
[   ] BIRD Binary Interpretation using Runtime Disassembly.pdf                                                         12-Aug-2017 08:47  109K  
[   ] Backdoors_et_rootkits_avancees.pdf                                                                               12-Aug-2017 08:47  248K  
[   ] Backdoors_et_rootkits_avancees_[SLIDES].pdf                                                                      12-Aug-2017 08:47  302K  
[   ] Bad Transfer.pdf                                                                                                 12-Aug-2017 08:47   44K  
[   ] Becoming Positive.pdf                                                                                            12-Aug-2017 08:47   74K  
[   ] Benefits and Considerations for a Single-Vendor Antivirus Strategy.pdf                                           12-Aug-2017 08:47  123K  
[   ] Beyond Layers and Peripheral Antivirus Security.pdf                                                              12-Aug-2017 08:47  213K  
[   ] Binary Obfuscation Using Signals.pdf                                                                             12-Aug-2017 08:47  175K  
[   ] Biological Aspects of Computer Virology.pdf                                                                      12-Aug-2017 08:47  135K  
[   ] Biological Models of Security for Virus Propagation in Computer Networks.pdf                                     12-Aug-2017 08:47   65K  
[   ] Biological versus Computer Viruses.pdf                                                                           12-Aug-2017 08:47  912K  
[   ] Biologically Inspired Defenses Against Computer Viruses.pdf                                                      12-Aug-2017 08:47  234K  
[   ] Blast off!.pdf                                                                                                   12-Aug-2017 08:47   30K  
[   ] Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses.pdf                 12-Aug-2017 08:47  1.4M  
[   ] Blueprint for a Computer Immune System.pdf                                                                       12-Aug-2017 08:47  133K  
[   ] Bot Software Spreads, Causes New Worries.pdf                                                                     12-Aug-2017 08:47  178K  
[   ] Botnetsand Applications.pdf                                                                                      12-Aug-2017 08:47  679K  
[   ] Broadband Network Virus Detection System Based on Bypass Monitor.pdf                                             12-Aug-2017 08:47  183K  
[   ] CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD VIRUSES AND COMPUTERS.pdf                                        12-Aug-2017 08:47  251K  
[   ] COMPUTE!'s computer viruses.pdf                                                                                  12-Aug-2017 08:47  4.6M  
[   ] COMPUTER VIRUS FUTURE CYBER WEAPONS.pdf                                                                          12-Aug-2017 08:47   28K  
[   ] COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT TECHNOLOGY.pdf                                                    12-Aug-2017 08:47   56K  
[   ] COMPUTER VIRUSES AND CIVIL LIABILITY A CONCEPTUAL FRAMEWORK.pdf                                                  12-Aug-2017 08:49  248K  
[   ] COMPUTER VIRUSES PREVENTION, DETECTION, AND TREATMENT.pdf                                                        12-Aug-2017 08:49   50K  
[   ] Cabirn fever.pdf                                                                                                 12-Aug-2017 08:47   37K  
[   ] Cain and Abul.pdf                                                                                                12-Aug-2017 08:47   41K  
[   ] Callgraph properties of executables.pdf                                                                          12-Aug-2017 08:47  1.1M  
[   ] Can cryptography prevent computer viruses.pdf                                                                    12-Aug-2017 08:47   77K  
[   ] Can you be held civilly liable for spreading computer viruses.pdf                                                12-Aug-2017 08:47  1.0M  
[   ] Can you spare a seg.pdf                                                                                          12-Aug-2017 08:47   44K  
[   ] Catch Me If You Can.pdf                                                                                          12-Aug-2017 08:47  891K  
[   ] Catch Me, If You Can Evading Network Signatures with Web-based Polymorphic Worms.pdf                             12-Aug-2017 08:47  106K  
[   ] Challenges Of Modeling BotNets For Military And Security Simulations.pdf                                         12-Aug-2017 08:47  354K  
[   ] Challenges in getting 'formal' with viruses.pdf                                                                  12-Aug-2017 08:47   34K  
[   ] Chamber of horrors.pdf                                                                                           12-Aug-2017 08:47   41K  
[   ] Characterization of virus replication.pdf                                                                        12-Aug-2017 08:47  599K  
[   ] Cheating the ELF Subversive Dynamic Linking to Libraries.pdf                                                     12-Aug-2017 08:47  240K  
[   ] Chiba witty blues.pdf                                                                                            12-Aug-2017 08:47   27K  
[   ] Classification and identification of malicious code based on heuristic techniques utilizing Meta languages.pdf   12-Aug-2017 08:47  2.0M  
[   ] Classification of Computer Viruses Using the Theory of Affordances.pdf                                           12-Aug-2017 08:47  226K  
[   ] Classification of Packed Executables for Accurate Computer Virus Detection.pdf                                   12-Aug-2017 08:47  195K  
[   ] Cobra Fine-grained Malware Analysis using Stealth Localized-executions.pdf                                       12-Aug-2017 08:47  649K  
[   ] Code Red Worm Propagation Modeling and Analysis.pdf                                                              12-Aug-2017 08:47  173K  
[   ] Code mutation techniques by means of formal grammars and automatons.pdf                                          12-Aug-2017 08:47  729K  
[   ] Code obfuscation and virus detection.pdf                                                                         12-Aug-2017 08:47  930K  
[   ] Code obfuscation techniques for metamorphic viruses.pdf                                                          12-Aug-2017 08:47  761K  
[   ] Code-Red a case study on the spread and victims of an Internet worm.pdf                                          12-Aug-2017 08:47  328K  
[   ] Collaborative Defense Against Zero-Day and Polymorphic Worms Detection, Response and an Evaluation Framework.pdf 12-Aug-2017 08:47  769K  
[   ] Combating computer viruses.pdf                                                                                   12-Aug-2017 08:47  246K  
[   ] Combinatorial Optimisation of Worm Propagation on an Unknown Network.pdf                                         12-Aug-2017 08:47  466K  
[   ] Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'.pdf                                  12-Aug-2017 08:47   57K  
[   ] Comparative analysis of various ransomware virii.pdf                                                             12-Aug-2017 08:47  1.7M  
[   ] Comparing Passive and Active Worm Defenses.pdf                                                                   12-Aug-2017 08:47  252K  
[   ] Computational Aspects of Computer Viruses.pdf                                                                    12-Aug-2017 08:47  1.4M  
[   ] Computer Immunology(Lau).pdf                                                                                     12-Aug-2017 08:47  327K  
[   ] Computer Immunology.pdf                                                                                          12-Aug-2017 08:47  450K  
[   ] Computer Insecurity and Viral AttacksLiability Issues Regarding Unsafe Computer Systems Under Quebec Law.pdf     12-Aug-2017 08:47  224K  
[   ] Computer Malware What You Don't Know Can Hurt You.pdf                                                            12-Aug-2017 08:47  157K  
[   ] Computer Parasitology.pdf                                                                                        12-Aug-2017 08:47   97K  
[   ] Computer Security Analysis through Decompilation and High-Level Debugging.pdf                                    12-Aug-2017 08:47   79K  
[   ] Computer Virus Identification and Prevention.pdf                                                                 12-Aug-2017 08:47   44K  
[   ] Computer Virus Myths.pdf                                                                                         12-Aug-2017 08:47  347K  
[   ] Computer Virus Operation and New Directions-1997.pdf                                                             12-Aug-2017 08:47  820K  
[   ] Computer Virus Operation and New Directions.pdf                                                                  12-Aug-2017 08:47  583K  
[   ] Computer Virus Propagation Model Based on Variable Propagation Rate.pdf                                          12-Aug-2017 08:47  727K  
[   ] Computer Virus Propagation Models.pdf                                                                            12-Aug-2017 08:47  291K  
[   ] Computer Virus Strategies and Detection Methods.pdf                                                              12-Aug-2017 08:47   77K  
[   ] Computer Virus Survival Guide.pdf                                                                                12-Aug-2017 08:47   25M  
[   ] Computer Virus-Antivirus Coevolution.pdf                                                                         12-Aug-2017 08:47  310K  
[   ] Computer Virus__.pdf                                                                                             12-Aug-2017 08:47   16K  
[   ] Computer Viruses - A Form of Artificial Life.pdf                                                                 12-Aug-2017 08:47  218K  
[   ] Computer Viruses - Legal Options.pdf                                                                             12-Aug-2017 08:48  233K  
[   ] Computer Viruses - Theory and Experiments.pdf                                                                    12-Aug-2017 08:48  1.3M  
[   ] Computer Viruses A Global Perspective.pdf                                                                        12-Aug-2017 08:48  234K  
[   ] Computer Viruses A Management Perspective.pdf                                                                    12-Aug-2017 08:48   24K  
[   ] Computer Viruses A Very Real Threat.pdf                                                                          12-Aug-2017 08:48  152K  
[   ] Computer Viruses Are Nothing New Don't be ashamed.pdf                                                            12-Aug-2017 08:49   10K  
[   ] Computer Viruses By Ingrid Richter.pdf                                                                           12-Aug-2017 08:49  399K  
[   ] Computer Viruses Can It Happen At IU.pdf                                                                         12-Aug-2017 08:49  231K  
[   ] Computer Viruses Episode.pdf                                                                                     12-Aug-2017 08:49  101K  
[   ] Computer Viruses The Disease, the Detection, and the Prescription for Protection Testimony.pdf                   12-Aug-2017 08:49  191K  
[   ] Computer Viruses The Technology and Evolution of an Artificial Life Form.pdf                                     12-Aug-2017 08:49  630K  
[   ] Computer Viruses The Threat Today and The Expected Future.pdf                                                    12-Aug-2017 08:49  269K  
[   ] Computer Viruses and Ethics.pdf                                                                                  12-Aug-2017 08:49  1.0M  
[   ] Computer Viruses and Malware.pdf                                                                                 12-Aug-2017 08:49   11M  
[   ] Computer Viruses and Other Malicious Software A Threat to the Internet Economy.pdf                               12-Aug-2017 08:49  3.7M  
[   ] Computer Viruses and Related Threats.pdf                                                                         12-Aug-2017 08:49   31K  
[   ] Computer Viruses and Their Control.pdf                                                                           12-Aug-2017 08:49   19K  
[   ] Computer Viruses and What to Do About Them.pdf                                                                   12-Aug-2017 08:49   97K  
[   ] Computer Viruses and the Simulation Environment WiCE.pdf                                                         12-Aug-2017 08:49  3.6M  
[   ] Computer Viruses as Artificial Life.pdf                                                                          12-Aug-2017 08:49  133K  
[   ] Computer Viruses as a Threat to Home Users.pdf                                                                   12-Aug-2017 08:49   76K  
[   ] Computer Viruses for Dummies.pdf                                                                                 12-Aug-2017 08:49  2.6M  
[   ] Computer Viruses on the Loose.pdf                                                                                12-Aug-2017 08:49  349K  
[   ] Computer Viruses the Inevitability of Evolution.pdf                                                              12-Aug-2017 08:49  451K  
[   ] Computer Viruses, Artificial Life and Evolution.pdf                                                              12-Aug-2017 08:49  3.8M  
[   ] Computer Viruses, Epidemiology and Worms.pdf                                                                     12-Aug-2017 08:49  440K  
[   ] Computer Viruses, Epidemiology, and Worms.pdf                                                                    12-Aug-2017 08:49  595K  
[   ] Computer Worms Past, Present, and Future.pdf                                                                     12-Aug-2017 08:49  136K  
[   ] Computer abuse vandalizing the information society.pdf                                                           12-Aug-2017 08:47   36K  
[   ] Computer doctor busy fighting `viruses'.pdf                                                                      12-Aug-2017 08:47  126K  
[   ] Computer intrusions and attacks.pdf                                                                              12-Aug-2017 08:47   57K  
[   ] Computer virus cover withdrawn.pdf                                                                               12-Aug-2017 08:47   90K  
[   ] Computer virus identification by neural networks.pdf                                                             12-Aug-2017 08:47  716K  
[   ] Computer virus immunization.pdf                                                                                  12-Aug-2017 08:47  4.5M  
[   ] Computer virus prevention and containment on mainframes.pdf                                                      12-Aug-2017 08:47  763K  
[   ] Computer virus prevention primer.pdf                                                                             12-Aug-2017 08:47   93K  
[   ] Computer viruses (BMJ 296-013).pdf                                                                               12-Aug-2017 08:47  2.3M  
[   ] Computer viruses (BMJ 299-66a).pdf                                                                               12-Aug-2017 08:47  344K  
[   ] Computer viruses (BMJ 302-66e).pdf                                                                               12-Aug-2017 08:47  302K  
[   ] Computer viruses (BMJ 307-59e).pdf                                                                               12-Aug-2017 08:47  664K  
[   ] Computer viruses - a high-tech disease.pdf                                                                       12-Aug-2017 08:48   85M  
[   ] Computer viruses - the current state in Italy.pdf                                                                12-Aug-2017 08:48  225K  
[   ] Computer viruses a quantitative analysis.pdf                                                                     12-Aug-2017 08:48  372K  
[   ] Computer viruses and anti-virus warfare.pdf                                                                      12-Aug-2017 08:49   91M  
[   ] Computer viruses and electronic mail.pdf                                                                         12-Aug-2017 08:49  204K  
[   ] Computer viruses demystified,2.pdf                                                                               12-Aug-2017 08:49  144K  
[   ] Computer viruses demystified.pdf                                                                                 12-Aug-2017 08:49  1.0M  
[   ] Computer viruses from theory to applications.pdf                                                                 12-Aug-2017 08:49  1.9M  
[   ] Computer-Generated Life.pdf                                                                                      12-Aug-2017 08:49   74K  
[   ] Computers and epidemiology.pdf                                                                                   12-Aug-2017 08:49  142K  
[   ] Computers under attacks!.pdf                                                                                     12-Aug-2017 08:49   85K  
[   ] Concepts and Future Trends in Computer Virology.pdf                                                              12-Aug-2017 08:49  841K  
[   ] Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf                                             12-Aug-2017 08:49  225K  
[   ] Concepts of cooperation in artificial life.pdf                                                                   12-Aug-2017 08:49  353K  
[   ] Conceptual Frameworks for Artificial Immune Systems.pdf                                                          12-Aug-2017 08:49  284K  
[   ] Conflict and the Computer Information Warfare and Related Ethical Issues.pdf                                     12-Aug-2017 08:49  248K  
[   ] Consensual Realities in Cyberspace.pdf                                                                           12-Aug-2017 08:49  242K  
[   ] Console viruses.pdf                                                                                              12-Aug-2017 08:49  119K  
[   ] Constructing Computer Virus Phylogenies.pdf                                                                      12-Aug-2017 08:49  190K  
[   ] Constructing Malware Normalizers using Term Rewriting.pdf                                                        12-Aug-2017 08:49  219K  
[   ] Contagion and Repetition On the Viral Logic of Network Culture.pdf                                               12-Aug-2017 08:49  173K  
[   ] Contagion on the Internet.pdf                                                                                    12-Aug-2017 08:49  118K  
[   ] Contournement dune passerelle antivirus.pdf                                                                      12-Aug-2017 08:49  122K  
[   ] Control Flow Graphs as Malware Signatures.pdf                                                                    12-Aug-2017 08:49  158K  
[   ] Control Flow to Detect Malware.pdf                                                                               12-Aug-2017 08:49  345K  
[   ] Controlling Super-Intelligent Machines.pdf                                                                       12-Aug-2017 08:49   18K  
[   ] Convergence of Virus Writers and Hackers Fact or Fantasy.pdf                                                     12-Aug-2017 08:49  255K  
[   ] Cooperative Automated worm Response and Detection ImmuNe ALgorithm.pdf                                           12-Aug-2017 08:49  143K  
[   ] Corporate Virus Protection.pdf                                                                                   12-Aug-2017 08:49   20K  
[   ] Countering Kernel Rootkits with Lightweight Hook Protection.pdf                                                  12-Aug-2017 08:49  188K  
[   ] Countering Network Worms Through Automatic Patch Generation.pdf                                                  12-Aug-2017 08:49  281K  
[   ] Countering NetworkWorms Through Automatic Patch Generation.pdf                                                   12-Aug-2017 08:49  150K  
[   ] Covert Distributed Processing with Computer Viruses.pdf                                                          12-Aug-2017 08:49  179K  
[   ] Creating a Secure Computer Virus Laboratory.pdf                                                                  12-Aug-2017 08:49   54K  
[   ] Crimea river.pdf                                                                                                 12-Aug-2017 08:49   44K  
[   ] Crisis and Aftermath.pdf                                                                                         12-Aug-2017 08:49  1.1M  
[   ] Criss-cross.pdf                                                                                                  12-Aug-2017 08:49   44K  
[   ] Cryptographic Hashing for Virus Localization.pdf                                                                 12-Aug-2017 08:49  154K  
[   ] Cryptography all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf                   12-Aug-2017 08:49  4.7M  
[   ] Cryptography and Viruses.pdf                                                                                     12-Aug-2017 08:49   96K  
[   ] Cryptovirology Extortion-Based Security Threats and Countermeasures.pdf                                          12-Aug-2017 08:49  1.1M  
[   ] DCA for Bot Detection.pdf                                                                                        12-Aug-2017 08:49  173K  
[   ] Danger theory and collaborative filtering in MANETs.pdf                                                          12-Aug-2017 08:49  372K  
[   ] Danger! Deadly new computer viruses want to kill your PC.pdf                                                     12-Aug-2017 08:49  131K  
[   ] Darwin inside the machines Malware evolution and the consequences for computer security.pdf                      12-Aug-2017 08:49  1.4M  
[   ] Darwin, a Game of Survival of the Fittest among Programs.pdf                                                     12-Aug-2017 08:49   26K  
[   ] Darwin.pdf                                                                                                       12-Aug-2017 08:49  216K  
[   ] Data Mining Methods for Detection of New Malicious Executables.pdf                                               12-Aug-2017 08:49  158K  
[   ] Data security from malicious attack Computer Virus.pdf                                                           12-Aug-2017 08:49  106K  
[   ] Database Rootkits.pdf                                                                                            12-Aug-2017 08:49  721K  
[   ] Deelaed learning.pdf                                                                                             12-Aug-2017 08:49   47K  
[   ] Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf                             12-Aug-2017 08:49  357K  
[   ] Defeating Polymorphism Beyond Emulation.pdf                                                                      12-Aug-2017 08:49  459K  
[   ] Defending Against Internet Worms A Signature-Based Approach.pdf                                                  12-Aug-2017 08:49  156K  
[   ] Defending against Hitlist Worms using Network Address Space Randomization.pdf                                    12-Aug-2017 08:49  163K  
[   ] Defending against Viruses and Worms.pdf                                                                          12-Aug-2017 08:49  1.2M  
[   ] Defense Against the Dark Arts.pdf                                                                                12-Aug-2017 08:49  101K  
[   ] Defense and Detection Strategies against Internet Worms.pdf                                                      12-Aug-2017 08:49  2.9M  
[   ] Defense-In-Depth Against Computer Viruses.pdf                                                                    12-Aug-2017 08:49  141K  
[   ] Des IDS Detection par lanalyse statistique.pdf                                                                   12-Aug-2017 08:49  295K  
[   ] Design of a System for Real-Time Worm Detection.pdf                                                              12-Aug-2017 08:49  243K  
[   ] Design of a neural network for recognition and classification of computer viruses.pdf                            12-Aug-2017 08:49  1.2M  
[   ] Design of an Artificial Immune System as a Novel Anomaly Detector.pdf                                            12-Aug-2017 08:49   69K  
[   ] Detecting Early Worm Propagation through Packet Matching.pdf                                                     12-Aug-2017 08:49  164K  
[   ] Detecting Internet Worms Using Data Mining Techniques.pdf                                                        12-Aug-2017 08:49  136K  
[   ] Detecting Kernel-Level Rootkits Through Binary Analysis.pdf                                                      12-Aug-2017 08:49  788K  
[   ] Detecting Malicious Code by Model Checking.pdf                                                                   12-Aug-2017 08:49  700K  
[   ] Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf                           12-Aug-2017 08:49  833K  
[   ] Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf                               12-Aug-2017 08:49  248K  
[   ] Detecting Metamorphic Computer Viruses using Supercompilation.pdf                                                12-Aug-2017 08:49  211K  
[   ] Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf           12-Aug-2017 08:49  574K  
[   ] Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf                                   12-Aug-2017 08:49  318K  
[   ] Detecting Sources of Computer Viruses in Networks Theory and Experiment.pdf                                      12-Aug-2017 08:49  1.1M  
[   ] Detecting Stealth Software with Strider GhostBuster.pdf                                                          12-Aug-2017 08:49  324K  
[   ] Detecting Unknown Computer Viruses.pdf                                                                           12-Aug-2017 08:49  1.3M  
[   ] Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf                                            12-Aug-2017 08:49  251K  
[   ] Detecting Viral Propagations Using Email Behavior Profiles.pdf                                                   12-Aug-2017 08:49  1.3M  
[   ] Detecting Virus Mutations Via Dynamic Matching.pdf                                                               12-Aug-2017 08:49  298K  
[   ] Detecting Windows Server Compromises with Patchfinder 2.pdf                                                      12-Aug-2017 08:49  187K  
[   ] Detecting Worms through Cryptographic Hashes.pdf                                                                 12-Aug-2017 08:49  308K  
[   ] Detecting Worms via Mining Dynamic Program Execution.pdf                                                         12-Aug-2017 08:49  231K  
[   ] Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf                                     12-Aug-2017 08:49  1.5M  
[   ] Detecting metamorphic viruses using profile hidden markov models.pdf                                             12-Aug-2017 08:49  548K  
[   ] Detecting self-mutating malware using control-flow graph matching.pdf                                            12-Aug-2017 08:49   98K  
[   ] Detecting worms through de-centralized monitoring.pdf                                                            12-Aug-2017 08:49  203K  
[   ] Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf                                  12-Aug-2017 08:49  230K  
[   ] Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf                      12-Aug-2017 08:49  222K  
[   ] Detection of Metamorphic and Virtualization-based malware using Algebraic Specification-2.pdf                    12-Aug-2017 08:49  147K  
[   ] Detection of New Malicious Code Using N-grams Signatures.pdf                                                     12-Aug-2017 08:49  359K  
[   ] Detection of Self-Mutating Computer Viruses.pdf                                                                  12-Aug-2017 08:49  114K  
[   ] Detection of metamorphic computer viruses using algebraic specification.pdf                                      12-Aug-2017 08:49  211K  
[   ] Developing a Trojan applets in a smart card.pdf                                                                  12-Aug-2017 08:49  640K  
[   ] Development of Computer Vulnerability Scanning Scanning Workgroup.pdf                                            12-Aug-2017 08:49  270K  
[   ] Development of inland lakes as hubs in an invasion network.pdf                                                   12-Aug-2017 08:49  972K  
[   ] Die Gefahr Von Debug Codes.pdf                                                                                   12-Aug-2017 08:49  169K  
[   ] Digital Postmark Helps Fight Spam, Virus Attacks.pdf                                                             12-Aug-2017 08:49  151K  
[   ] Directed-Graph Epidemiological Models of Computer Viruses.pdf                                                    12-Aug-2017 08:49  1.6M  
[   ] Disk-Level Behavioral Malware Detection.pdf                                                                      12-Aug-2017 08:50  1.1M  
[   ] Disk-Level Behavioral Virus Detection.pdf                                                                        12-Aug-2017 08:50  5.5M  
[   ] Distributed Computing with a Trojan Horse.pdf                                                                    12-Aug-2017 08:50  590K  
[   ] Distributed Worm Simulation with a Realistic Internet Model.pdf                                                  12-Aug-2017 08:50  593K  
[   ] Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf                     12-Aug-2017 08:50  889K  
[   ] Do The Media Spread Computer Viruses.pdf                                                                         12-Aug-2017 08:50   18K  
[   ] Do the macarena.pdf                                                                                              12-Aug-2017 08:50   58K  
[   ] Do-It-Yourself Guide to Cell Phone Malware.pdf                                                                   12-Aug-2017 08:50  188K  
[   ] Doin' the eagle rock.pdf                                                                                         12-Aug-2017 08:50   45K  
[   ] Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf                                           12-Aug-2017 08:50  343K  
[   ] Dynamic analysis of malicious code.pdf                                                                           12-Aug-2017 08:50  212K  
[   ] Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf                     12-Aug-2017 08:50  3.8M  
[   ] Dynamical Models for Computer Viruses Propagation.pdf                                                            12-Aug-2017 08:50  3.8M  
[   ] E-mail virus protection handbook.pdf                                                                             12-Aug-2017 08:50  492K  
[   ] ELF et virologie informatique.pdf                                                                                12-Aug-2017 08:50  257K  
[   ] EPOCalypse NOW!.pdf                                                                                              12-Aug-2017 08:50  456K  
[   ] Effective and Inexpensive Methods Exist for Controlling Software Viruses.pdf                                     12-Aug-2017 08:50  198K  
[   ] Effectiveness of Quarantine in Worm Epidemics.pdf                                                                12-Aug-2017 08:50  355K  
[   ] Effectiveness of Rate Control in Slowing Down Worm Epidemics.pdf                                                 12-Aug-2017 08:50  259K  
[   ] Efficiency of Trusted Platform Module Against Computer Attacks.pdf                                               12-Aug-2017 08:50  157K  
[   ] Efficient Content-Based Detection of Zero-Day Worms.pdf                                                          12-Aug-2017 08:50   98K  
[   ] Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf                                   12-Aug-2017 08:50  536K  
[   ] Efficient Virus Detection Using Dynamic Instruction Sequences.pdf                                                12-Aug-2017 08:50  438K  
[   ] Efficient quarantining of scanning worms optimal detection and coordination.pdf                                  12-Aug-2017 08:50  173K  
[   ] Email Virus Propagation Modeling and Analysis.pdf                                                                12-Aug-2017 08:50  359K  
[   ] Email networks and the spread of computer viruses.pdf                                                            12-Aug-2017 08:50  264K  
[   ] End-to-end security implementation for mobile devices using TLS protocol.pdf                                     12-Aug-2017 08:50  568K  
[   ] Epidemic Profiles and Defense of Scale-Free Networks.pdf                                                         12-Aug-2017 08:50  161K  
[   ] Epidemic Spreading in Real Networks An Eigenvalue Viewpoint.pdf                                                  12-Aug-2017 08:50  279K  
[   ] Epidemic dynamics and endemic states in complex networks.pdf                                                     12-Aug-2017 08:50  279K  
[   ] Epidemics and immunization in scale-free networks.pdf                                                            12-Aug-2017 08:50  221K  
[   ] Epidemiological Modelling of Peer-to-Peer Viruses and Pollution.pdf                                              12-Aug-2017 08:50  828K  
[   ] Epidemiological Models Applied to Viruses in Computer Networks.pdf                                               12-Aug-2017 08:50  106K  
[   ] Equational reasoning obfuscated decipher routine.pdf                                                             12-Aug-2017 08:50   99K  
[   ] Ethereal analyseur multiples.pdf                                                                                 12-Aug-2017 08:50  499K  
[   ] Ethical Issues in Computer Virus Distribution.pdf                                                                12-Aug-2017 08:50  103K  
[   ] Evaluation of Two Host-Based Intrusion Prevention Systems.pdf                                                    12-Aug-2017 08:50  171K  
[   ] Evaluation of malware phylogeny modelling systems using automated variant generation.pdf                         12-Aug-2017 08:50  309K  
[   ] Evolution, Ecology and Optimization of Digital Organisms.pdf                                                     12-Aug-2017 08:50  179K  
[   ] Evolvable Malware.pdf                                                                                            12-Aug-2017 08:50  567K  
[   ] Examing Viruses.pdf                                                                                              12-Aug-2017 08:50  1.1M  
[   ] Execution Context in Anti-Malware Testing.pdf                                                                    12-Aug-2017 08:50  156K  
[   ] Experience with Viruses on UNIX Systems.pdf                                                                      12-Aug-2017 08:50  1.5M  
[   ] Exploiting an Antivirus Interface.pdf                                                                            12-Aug-2017 08:50  187K  
[   ] Extended recursion-based formalization of virus mutation.pdf                                                     12-Aug-2017 08:50  259K  
[   ] FPGA Viruses.pdf                                                                                                 12-Aug-2017 08:50  166K  
[   ] Fast Detection of Scanning Worm Infections.pdf                                                                   12-Aug-2017 08:50  247K  
[   ] Fast virus detection by using high speed time delay neural networks.pdf                                          12-Aug-2017 08:50  579K  
[   ] Faster parameter detection of polymorphic viral binary code using hot list strategy.pdf                          12-Aug-2017 08:50   95K  
[   ] Feedback Email Worm Defense System for Enterprise Networks.pdf                                                   12-Aug-2017 08:50  143K  
[   ] Fighting Computer Viruses.pdf                                                                                    12-Aug-2017 08:50  129K  
[   ] Fighting EPO Viruses.pdf                                                                                         12-Aug-2017 08:50  369K  
[   ] File system driver filtering against metamorphic viral coding.pdf                                                12-Aug-2017 08:50   91K  
[   ] Fileprint analysis for Malware Detection.pdf                                                                     12-Aug-2017 08:50  850K  
[   ] Finding Malware on Compromised Windows Machines.pdf                                                              12-Aug-2017 08:50  102K  
[   ] First Virus.pdf                                                                                                  12-Aug-2017 08:50  436K  
[   ] Flexible Infections Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism.pdf                   12-Aug-2017 08:50   91K  
[   ] Flibi Evolution.pdf                                                                                              12-Aug-2017 08:50   93K  
[   ] Flibi night.pdf                                                                                                  12-Aug-2017 08:50   41K  
[   ] Flying below the Radar What modern malware tells us.pdf                                                          12-Aug-2017 08:50  2.4M  
[   ] Flying solo.pdf                                                                                                  12-Aug-2017 08:50   55K  
[   ] Formal Affordance-based Models of Computer Virus Reproduction.pdf                                                12-Aug-2017 08:50  322K  
[   ] Formal Definition of Self-reproductive Systems.pdf                                                               12-Aug-2017 08:50   74K  
[   ] Formal Models of Reproduction from Computer Viruses to Artificial Life.pdf                                       12-Aug-2017 08:50  3.1M  
[   ] Formalisation and implementation aspects of K -ary (malicious) codes.pdf                                         12-Aug-2017 08:50  380K  
[   ] Formalization of viruses and malware through process algebras.pdf                                                12-Aug-2017 08:50  220K  
[   ] Fragmented malware through RFID and its defenses.pdf                                                             12-Aug-2017 08:50  816K  
[   ] Frankie say relax.pdf                                                                                            12-Aug-2017 08:50   42K  
[   ] Free Anti-Virus Tips and Techniques.pdf                                                                          12-Aug-2017 08:50  940K  
[   ] From AntiVirus to AntiMalware Software and Beyond.pdf                                                            12-Aug-2017 08:50   90K  
[   ] Functional polymorphic engines formalisation, implementation and use cases.pdf                                   12-Aug-2017 08:50  1.0M  
[   ] Functional similarities between computer worms and biological pathogens.pdf                                      12-Aug-2017 08:50  215K  
[   ] Future Trends in Malicious Code - 2006 Report.pdf                                                                12-Aug-2017 08:50   87K  
[   ] GETTING THE WORD OUT.pdf                                                                                         12-Aug-2017 08:50  5.6K  
[   ] Gatt got your tongue.pdf                                                                                         12-Aug-2017 08:50   56K  
[   ] Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior.pdf                             12-Aug-2017 08:50  257K  
[   ] Generic Detection and Classification of Polymorphic Malware Using Neural Pattern Recognition.pdf                 12-Aug-2017 08:50  318K  
[   ] Generic Virus Scanner in C++.pdf                                                                                 12-Aug-2017 08:50   90K  
[   ] Generic metamorphic engine to a black-box classification of antivirus detection techniques.pdf                   12-Aug-2017 08:50  570K  
[   ] Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures.pdf        12-Aug-2017 08:50  131K  
[   ] Geometry-based flash worm detection.pdf                                                                          12-Aug-2017 08:50  567K  
[   ] Good Worms and Human Rights.pdf                                                                                  12-Aug-2017 08:50   45K  
[   ] Got [Mac]root.pdf                                                                                                12-Aug-2017 08:50   41K  
[   ] HIPAA and Information Security Policies.pdf                                                                      12-Aug-2017 08:50   38K  
[   ] Halting viruses in scale-free networks.pdf                                                                       12-Aug-2017 08:50   54K  
[   ] Harmless and Useful Viruses Can Hardly Exist.pdf                                                                 12-Aug-2017 08:50  150K  
[   ] Hash-AV Fast Virus Signature Scanning by Cache-Resident Filters.pdf                                              12-Aug-2017 08:50  142K  
[   ] Heads or tails.pdf                                                                                               12-Aug-2017 08:50   36K  
[   ] Hidan and dangerous.pdf                                                                                          12-Aug-2017 08:50   47K  
[   ] Hidden Rootkits in Windows.pdf                                                                                   12-Aug-2017 08:50  397K  
[   ] Hide'n'Seek Anatomy of Stealth Malware.pdf                                                                       12-Aug-2017 08:50  248K  
[   ] High-Fidelity Modeling of Computer Network Worms.pdf                                                             12-Aug-2017 08:50  401K  
[   ] High-Performance Context-Free Parser for Polymorphic Malware Detection.pdf                                       12-Aug-2017 08:50  177K  
[   ] History of Viruses & Worms.pdf                                                                                   12-Aug-2017 08:50  229K  
[   ] HoneyStat Local Worm Detection Using Honeypots.pdf                                                               12-Aug-2017 08:50  266K  
[   ] Honeypots against Worms 101.pdf                                                                                  12-Aug-2017 08:50  809K  
[   ] Host-Based Detection of Worms through Peer-to-Peer Cooperation.pdf                                               12-Aug-2017 08:50  352K  
[   ] How To Withstand Mobile Virus Attacks.pdf                                                                        12-Aug-2017 08:50  217K  
[   ] How Viruses Spread among Computers and People.pdf                                                                12-Aug-2017 08:50  452K  
[   ] How dumaru.pdf                                                                                                   12-Aug-2017 08:50  449K  
[   ] How the virus Remote Shell Trojan(RST) works.pdf                                                                 12-Aug-2017 08:50   21K  
[   ] How to Kill Worms and Viruses with Policy Pontifications.pdf                                                     12-Aug-2017 08:50  253K  
[   ] How to assess the effectiveness of your anti-virus.pdf                                                           12-Aug-2017 08:50  175K  
[   ] Hunting For Metamorphic.pdf                                                                                      12-Aug-2017 08:50  902K  
[   ] Hunting Obfuscated Malwares by Abstract Interpretation.pdf                                                       12-Aug-2017 08:50   48K  
[   ] Hunting for Metamorphic Engines.pdf                                                                              12-Aug-2017 08:50  1.0M  
[   ] Hunting for undetectable metamorphic viruses.pdf                                                                 12-Aug-2017 08:50  1.2M  
[   ] I love you.pdf                                                                                                   12-Aug-2017 08:50   56K  
[   ] I've named my virus - now what do I win.pdf                                                                      12-Aug-2017 08:50   65K  
[   ] I.T. IN PRACTICE Computer viruses.pdf                                                                            12-Aug-2017 08:50  4.3M  
[   ] IDS alerts correlation using grammar-based approach.pdf                                                          12-Aug-2017 08:50  640K  
[   ] IMAD In-Execution Malware Analysis and Detection.pdf                                                             12-Aug-2017 08:50  751K  
[   ] IPA Computer Virus Survey 2000.pdf                                                                               12-Aug-2017 08:51  1.4M  
[   ] Identification of file infecting viruses through detection of self-reference replication.pdf                     12-Aug-2017 08:50  1.2M  
[   ] Identifying Malicious Code Through Reverse Engineering.pdf                                                       12-Aug-2017 08:50  6.2M  
[   ] Identifying Metamorphic Malware.pdf                                                                              12-Aug-2017 08:50  163K  
[   ] Immune System for Virus Detection and Elimination.pdf                                                            12-Aug-2017 08:50  740K  
[   ] Immunity-Based Intrusion Detection System A General Framework.pdf                                                12-Aug-2017 08:50   83K  
[   ] Immunization and epidemic dynamics in complex networks.pdf                                                       12-Aug-2017 08:50  253K  
[   ] Impact of Computer Viruses on Society.pdf                                                                        12-Aug-2017 08:50  333K  
[   ] Impeding Malware Analysis Using Conditional Code Obfuscation.pdf                                                 12-Aug-2017 08:50  1.6M  
[   ] Impeding worm epidemics through destination address filtering.pdf                                                12-Aug-2017 08:50   62K  
[   ] Implementation of a Computer Immune System for Intrusion- and Virus Detection.pdf                                12-Aug-2017 08:50  1.0M  
[   ] Implementing Anti-Virus Controls in the Corporate Arena.pdf                                                      12-Aug-2017 08:50   49K  
[   ] Implementing and Detecting an ACPI BIOS Rootkit.pdf                                                              12-Aug-2017 08:50  373K  
[   ] Implementing and testing a virus throttle.pdf                                                                    12-Aug-2017 08:50  137K  
[   ] Implications of Peer-to-Peer Networks on Worm Attacks and Defenses.pdf                                           12-Aug-2017 08:50  558K  
[   ] Implicatoes da ofuscatao de codigo no desenvolvimento de detectores de codigo malicioso.pdf                      12-Aug-2017 08:50  282K  
[   ] Imposing Order on Program Statements to Assist Anti-Virus Scanners.pdf                                           12-Aug-2017 08:50  304K  
[   ] Improving Malware Detection by Applying Multi-Inducer Ensemble.pdf                                               12-Aug-2017 08:50  442K  
[   ] In-depth analysis of the viral threats with OpenOf#ce.org documents.pdf                                          12-Aug-2017 08:50  2.6M  
[   ] Incorporating E-Commerce, Internet and Telecommunications Security.pdf                                           12-Aug-2017 08:51   51K  
[   ] Infection dynamics on scale-free networks.pdf                                                                    12-Aug-2017 08:51   57K  
[   ] Infection dynamics on the Internet.pdf                                                                           12-Aug-2017 08:51  154K  
[   ] Infection, imitation and a hierarchy of computer viruses.pdf                                                     12-Aug-2017 08:51  162K  
[   ] Information Assurance and the Information Society.pdf                                                            12-Aug-2017 08:51   69K  
[   ] Information warfare and security.pdf                                                                             12-Aug-2017 08:51   77K  
[   ] Inoculating SSH Against Address-Harvesting Worms.pdf                                                             12-Aug-2017 08:51  380K  
[   ] Inoculation strategies for victims of viruses and the sum-of-squares partition problem.pdf                       12-Aug-2017 08:51  195K  
[   ] Inside the Slammer Worm.pdf                                                                                      12-Aug-2017 08:51  415K  
[   ] Internet - Virusnet.pdf                                                                                          12-Aug-2017 08:51  569K  
[   ] Internet Instability and Disturbance Goal or Menace.pdf                                                          12-Aug-2017 08:51  1.9M  
[   ] Internet Quarantine Requirements for Containing Self-Propagating Code.pdf                                        12-Aug-2017 08:51  153K  
[   ] Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware.pdf                                    12-Aug-2017 08:51  568K  
[   ] Internet computer virus protection policy.pdf                                                                    12-Aug-2017 08:51  136K  
[   ] Introducing Stealth Malware Taxonomy.pdf                                                                         12-Aug-2017 08:51  344K  
[   ] Introduction to Network Self-defense technical and judicial issues.pdf                                           12-Aug-2017 08:51  222K  
[   ] Intrusion Detection for Viruses and Worms.pdf                                                                    12-Aug-2017 08:51   92K  
[   ] IpMorph fingerprinting spoofing unification.pdf                                                                  12-Aug-2017 08:51  1.2M  
[   ] Iranian Journal Examines Electronic Warfare.pdf                                                                  12-Aug-2017 08:51   12K  
[   ] Is Your Cat Infected with a Computer Virus.pdf                                                                   12-Aug-2017 08:51  194K  
[   ] Is creating virus software protected as a first amendment right.pdf                                              12-Aug-2017 08:51   12K  
[   ] Is virus writing really that bad.pdf                                                                             12-Aug-2017 08:51  445K  
[   ] It's a bird, it's a plane, it's Fooperman.pdf                                                                    12-Aug-2017 08:51   50K  
[   ] It's zell(d)ome the one you expect.pdf                                                                           12-Aug-2017 08:51   30K  
[   ] JAB, une backdoor pour reseau Win32 inconnu - Presentation SSTIC.pdf                                             12-Aug-2017 08:51  255K  
[   ] JAB, une backdoor pour reseau Win32 inconnu.pdf                                                                  12-Aug-2017 08:51   75K  
[   ] Know Your Enemy Containing Conficker.pdf                                                                         12-Aug-2017 08:51  700K  
[   ] Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems.pdf           12-Aug-2017 08:51  446K  
[   ] La_mobilite_du_code_malveillant.pdf                                                                              12-Aug-2017 08:51  233K  
[   ] Language, a virus.pdf                                                                                            12-Aug-2017 08:51   44K  
[   ] Le malware en 2005 Unix, Linux et autres plates-formes.pdf                                                       12-Aug-2017 08:51   86K  
[   ] Leaps and Bounds.pdf                                                                                             12-Aug-2017 08:51   51K  
[   ] Learning to Detect Malicious Executables in the Wild.pdf                                                         12-Aug-2017 08:51  211K  
[   ] Learning to Detect and Classify Malicious Executables in the Wild.pdf                                            12-Aug-2017 08:51  202K  
[   ] Legal Options To Computer Viruses.pdf                                                                            12-Aug-2017 08:51  242K  
[   ] Les_virus_informatiques_Theorie_pratique_et_applications.pdf                                                     12-Aug-2017 08:51   20M  
[   ] Let free(dom) Ring!.pdf                                                                                          12-Aug-2017 08:51   76K  
[   ] Let them eat brioche.pdf                                                                                         12-Aug-2017 08:51   23K  
[   ] Limits of Static Analysis for Malware Detection.pdf                                                              12-Aug-2017 08:51  185K  
[   ] Linux Improvised Userland Scheduler Virus.pdf                                                                    12-Aug-2017 08:51  112K  
[   ] Loathing Lupper in Linux.pdf                                                                                     12-Aug-2017 08:51  389K  
[   ] Look at that escargot.pdf                                                                                        12-Aug-2017 08:51   38K  
[   ] Looking a Bagift-Horse in the Mouth.pdf                                                                          12-Aug-2017 08:51   43K  
[   ] MALWARE ANALYSIS.pdf                                                                                             12-Aug-2017 08:51   59K  
[   ] MCF a malicious code filter.pdf                                                                                  12-Aug-2017 08:52  2.2M  
[   ] MRSI A Fast Pattern Matching Algorithm for Anti-virus Applications.pdf                                           12-Aug-2017 08:52  293K  
[   ] Macro virus identification problems.pdf                                                                          12-Aug-2017 08:51  2.1M  
[   ] Magisterium Abraxas.pdf                                                                                          12-Aug-2017 08:51  152K  
[   ] Making a hash of things.pdf                                                                                      12-Aug-2017 08:51   39K  
[   ] Malicious Codes in Depth.pdf                                                                                     12-Aug-2017 08:51  298K  
[   ] Malicious Cryptography - Exposing Cryptovirology.pdf                                                             12-Aug-2017 08:51   29M  
[   ] Malicious Cryptography Cryptovirology and Kleptography.pdf                                                       12-Aug-2017 08:51   42K  
[   ] Malicious Cryptography Kleptographic Aspects.pdf                                                                 12-Aug-2017 08:51  168K  
[   ] Malicious Data and Computer Security.pdf                                                                         12-Aug-2017 08:51   64K  
[   ] Malicious Software in Mobile Devices.pdf                                                                         12-Aug-2017 08:51  395K  
[   ] Malicious Software.pdf                                                                                           12-Aug-2017 08:51  360K  
[   ] Malicious Threats to Personal Digital Assistants.pdf                                                             12-Aug-2017 08:51   79K  
[   ] Malicious origami in PDF.pdf                                                                                     12-Aug-2017 08:51  1.8M  
[   ] Malware Analyst's Cookbook and DVD.pdf                                                                           12-Aug-2017 08:51  8.9M  
[   ] Malware Collection and Incident Response Proposal Discover.pdf                                                   12-Aug-2017 08:51  810K  
[   ] Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf                         12-Aug-2017 08:51  631K  
[   ] Malware Detection using Statistical Analysis of Byte-Level File Content.pdf                                      12-Aug-2017 08:51  304K  
[   ] Malware Detection.pdf                                                                                            12-Aug-2017 08:51   18M  
[   ] Malware Forensics Investigating and Analyzing Malicious Code.pdf                                                 12-Aug-2017 08:52   25M  
[   ] Malware Normalization.pdf                                                                                        12-Aug-2017 08:52  312K  
[   ] Malware Phylogeny Generation using Permutations of Code.pdf                                                      12-Aug-2017 08:52  217K  
[   ] Malware Research at SMU.pdf                                                                                      12-Aug-2017 08:52  289K  
[   ] Malware Von Viren, Wuermern, Hackern und Trojanern und wie man sich vor ihnen schuetzt.pdf                       12-Aug-2017 08:52   22M  
[   ] Malware analysis for windows administrators.pdf                                                                  12-Aug-2017 08:51   73K  
[   ] Malware behaviour analysis.pdf                                                                                   12-Aug-2017 08:51  899K  
[   ] Malware comes of age The arrival of the true computer parasite.pdf                                               12-Aug-2017 08:51  244K  
[   ] Malware in Popular Networks.pdf                                                                                  12-Aug-2017 08:52  133K  
[   ] Malware pattern scanning schemes secure against black-box analysis.pdf                                           12-Aug-2017 08:52  385K  
[   ] Malware, Viruses and Log Visualisation.pdf                                                                       12-Aug-2017 08:52  474K  
[   ] Malware.pdf                                                                                                      12-Aug-2017 08:52   47K  
[   ] MalwareA Future Framework for Device, Network and Service Management.pdf                                         12-Aug-2017 08:52  275K  
[   ] Managing Computer Viruses in a Groupware Environment.pdf                                                         12-Aug-2017 08:52  124K  
[   ] Marginal Networks The Virus between Complexity and Suppression.pdf                                               12-Aug-2017 08:52  252K  
[   ] Mathematical Model of Computer Viruses.pdf                                                                       12-Aug-2017 08:52   90K  
[   ] Mathematical Viruses.pdf                                                                                         12-Aug-2017 08:52  111K  
[   ] Mathematical models on computer viruses.pdf                                                                      12-Aug-2017 08:52  353K  
[   ] Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf                                    12-Aug-2017 08:52  1.1M  
[   ] Measuring and Modeling Computer Virus Prevalence.pdf                                                             12-Aug-2017 08:52  1.2M  
[   ] Measuring virtual machine detection in malware using DSD tracer.pdf                                              12-Aug-2017 08:52  764K  
[   ] Mechanics of Self-reproduction.pdf                                                                               12-Aug-2017 08:52  1.7M  
[   ] Metamorphic Virus Analysis and Detection.pdf                                                                     12-Aug-2017 08:52  1.0M  
[   ] Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf                                                  12-Aug-2017 08:52  369K  
[   ] Metaphors And Meta-Experiences In Technology Side Effects A Multimedia Exhibit.pdf                               12-Aug-2017 08:52  380K  
[   ] Metaphors and Modern Threats Biological, Computer, and Cognitive Viruses.pdf                                     12-Aug-2017 08:52  962K  
[   ] Mimimorphism A New Approach to Binary Code Obfuscation.pdf                                                       12-Aug-2017 08:52  387K  
[   ] Mind Wars Attack of the Memes.pdf                                                                                12-Aug-2017 08:52  120K  
[   ] Misleading Modern Malware.pdf                                                                                    12-Aug-2017 08:52  370K  
[   ] Mobile Code Threats, Fact or Fiction.pdf                                                                         12-Aug-2017 08:52   83K  
[   ] Mobile Malware Attacks and Defense.pdf                                                                           12-Aug-2017 08:52  6.7M  
[   ] Model for network behaviour under viral attack.pdf                                                               12-Aug-2017 08:52  1.1M  
[   ] Model-Based Analysis of Two Fighting Worms.pdf                                                                   12-Aug-2017 08:52  320K  
[   ] Model_for_detecting_the_existence_of_software_corruption_in_real_time.pdf                                        12-Aug-2017 08:52  218K  
[   ] Modeling Botnet Propagation Using Time Zones.pdf                                                                 12-Aug-2017 08:52  528K  
[   ] Modeling Computer Viruses.pdf                                                                                    12-Aug-2017 08:52  595K  
[   ] Modeling Epidemic Spreading in Mobile Environments.pdf                                                           12-Aug-2017 08:52  573K  
[   ] Modeling Malware Spreading Dynamics.pdf                                                                          12-Aug-2017 08:52  790K  
[   ] Modeling Virus Propagation in Peer-to-Peer Networks.pdf                                                          12-Aug-2017 08:52  129K  
[   ] Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf         12-Aug-2017 08:52  433K  
[   ] Modeling the Effects of Timing Parameters on Virus Propagation.pdf                                               12-Aug-2017 08:52  678K  
[   ] Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf                                   12-Aug-2017 08:52  2.2M  
[   ] Modeling the Spread of Active Worms.pdf                                                                          12-Aug-2017 08:52  632K  
[   ] Modelling Development of Epidemics with Dynamic Small-World Networks.pdf                                         12-Aug-2017 08:52  233K  
[   ] Models of Active Worm Defenses.pdf                                                                               12-Aug-2017 08:52  210K  
[   ] Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf                                        12-Aug-2017 08:52  130K  
[   ] Modern operating systems.pdf                                                                                     12-Aug-2017 08:52  425K  
[   ] Modular worms.pdf                                                                                                12-Aug-2017 08:52  108K  
[   ] Monitoring and Early Warning for Internet Worms.pdf                                                              12-Aug-2017 08:52  195K  
[   ] Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf                             12-Aug-2017 08:52  1.3M  
[   ] Morphological Detection of Malware.pdf                                                                           12-Aug-2017 08:52  787K  
[   ] Mostly harmless.pdf                                                                                              12-Aug-2017 08:52   46K  
[   ] Multi-Stage Delivery of Malware.pdf                                                                              12-Aug-2017 08:52  2.0M  
[   ] Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf                    12-Aug-2017 08:52  115K  
[   ] N-gram analysis for computer virus detection.pdf                                                                 12-Aug-2017 08:52  217K  
[   ] N-gram-based Detection of New Malicious Code.pdf                                                                 12-Aug-2017 08:52   84K  
[   ] Nematodes - Beneficial Worms.pdf                                                                                 12-Aug-2017 08:52  114K  
[   ] Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf                         12-Aug-2017 08:52  448K  
[   ] Network Worms.pdf                                                                                                12-Aug-2017 08:52  149K  
[   ] Networks, Control, and Life-Forms.pdf                                                                            12-Aug-2017 08:52  174K  
[   ] New data mining technique to enhance IDS alarms quality.pdf                                                      12-Aug-2017 08:52  672K  
[   ] New malware distribution methods threaten signature-based AV.pdf                                                 12-Aug-2017 08:52  248K  
[   ] New method of fighting computer viruses announced.pdf                                                            12-Aug-2017 08:52  115K  
[   ] New thoughts in ring3 NT rootkit.pdf                                                                             12-Aug-2017 08:52  260K  
[   ] New threats of Java viruses.pdf                                                                                  12-Aug-2017 08:52  183K  
[   ] Next-Generation Viruses Present New Challenges.pdf                                                               12-Aug-2017 08:52   83K  
[   ] Nimda Worm Shows You Can't Always Patch Fast Enough.pdf                                                          12-Aug-2017 08:52   24K  
[   ] Non-signature based virus detection.pdf                                                                          12-Aug-2017 08:52  1.0M  
[   ] Normalizing Metamorphic Malware Using Term Rewriting.pdf                                                         12-Aug-2017 08:52  161K  
[   ] Not Teaching Viruses and Worms Is Harmful.pdf                                                                    12-Aug-2017 08:52   40K  
[   ] Not worthy.pdf                                                                                                   12-Aug-2017 08:52   38K  
[   ] Notes on the Worms programs.pdf                                                                                  12-Aug-2017 08:52  1.3M  
[   ] Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf                12-Aug-2017 08:52   31K  
[   ] Old Win32 Code for a Modern Super-stealth Trojan.pdf                                                             12-Aug-2017 08:52  352K  
[   ] On Callgraphs and Generative Mechanisms.pdf                                                                      12-Aug-2017 08:52  1.8M  
[   ] On Computer Viral Infection and the Effect of Immunization.pdf                                                   12-Aug-2017 08:52  180K  
[   ] On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf                  12-Aug-2017 08:52  191K  
[   ] On Effectiveness of Defense Systems against Active Worms.pdf                                                     12-Aug-2017 08:52  1.2M  
[   ] On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf                                            12-Aug-2017 08:52  313K  
[   ] On JavaScript Malware and related threats.pdf                                                                    12-Aug-2017 08:52  436K  
[   ] On abstract computer virology from a recursion theoretic perspective.pdf                                         12-Aug-2017 08:52  178K  
[   ] On abstract computer virology from a recursion-theoretic perspective.pdf                                         12-Aug-2017 08:52  204K  
[   ] On behavioral detection.pdf                                                                                      12-Aug-2017 08:52  119K  
[   ] On self-reproducing computer programs.pdf                                                                        12-Aug-2017 08:52  6.2M  
[   ] On the Effectiveness of Address-Space Randomization.pdf                                                          12-Aug-2017 08:52  147K  
[   ] On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf                               12-Aug-2017 08:52  335K  
[   ] On the Performance of Internet Worm Scanning Strategies.pdf                                                      12-Aug-2017 08:52  249K  
[   ] On the Semantics of Self-Unpacking Malware Code.pdf                                                              12-Aug-2017 08:52  164K  
[   ] On the Spread of Viruses on the Internet.pdf                                                                     12-Aug-2017 08:52  218K  
[   ] On the Time Complexity of Computer Viruses.pdf                                                                   12-Aug-2017 08:52  206K  
[   ] On the definition and classification of cybercrime.pdf                                                           12-Aug-2017 08:52  117K  
[   ] On the functional validity of the worm-killing worm.pdf                                                          12-Aug-2017 08:52  116K  
[   ] On the possibility of practically obfuscating programs.pdf                                                       12-Aug-2017 08:52  373K  
[   ] On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf                            12-Aug-2017 08:52  487K  
[   ] One-hit models for virus inactivation studies.pdf                                                                12-Aug-2017 08:52   92K  
[   ] Opcodes as Predictor for Malware.pdf                                                                             12-Aug-2017 08:52  660K  
[   ] Open Problems in Computer Virus Research.pdf                                                                     12-Aug-2017 08:52   42K  
[   ] Open problems in computer virology.pdf                                                                           12-Aug-2017 08:52  167K  
[   ] Owning Antivirus.pdf                                                                                             12-Aug-2017 08:52  145K  
[   ] PC Magazine Fighting Spyware Viruses and Malware.pdf                                                             12-Aug-2017 08:53   10M  
[   ] PE-Miner Mining Structural Information to Detect Malicious Executables in Realtime.pdf                           12-Aug-2017 08:53  464K  
[   ] PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN P2P NETWORKS.pdf                                                 12-Aug-2017 08:53  263K  
[   ] Painting the Internet A Different Kind of Warhol Worm.pdf                                                        12-Aug-2017 08:52   84K  
[   ] Pairwise alignment of metamorphic computer viruses.pdf                                                           12-Aug-2017 08:52  294K  
[   ] Panic computing The viral metaphor and computer technology.pdf                                                   12-Aug-2017 08:52  876K  
[   ] Paradise lost.pdf                                                                                                12-Aug-2017 08:53   56K  
[   ] Parallel analysis of polymorphic viral code using automated deduction system.pdf                                 12-Aug-2017 08:53  113K  
[   ] Parallels Between Biological and Computer Epidemics.pdf                                                          12-Aug-2017 08:53  260K  
[   ] Password Cracking A Game of Wits.pdf                                                                             12-Aug-2017 08:53  477K  
[   ] Peer-to-Peer Botnets Analysis and Detection.pdf                                                                  12-Aug-2017 08:53  2.2M  
[   ] Poison Ivy Farmers Virus Collections.pdf                                                                         12-Aug-2017 08:53   80K  
[   ] Polymorphic Worm Detection Using Structural Information of Executables.pdf                                       12-Aug-2017 08:53  250K  
[   ] Polymorphic and Metamorphic Malware Detection.pdf                                                                12-Aug-2017 08:53  1.3M  
[   ] Polymorphic virus detection technology.pdf                                                                       12-Aug-2017 08:53  579K  
[   ] Polymorphing Software by Randomizing Data Structure Layout.pdf                                                   12-Aug-2017 08:53  324K  
[   ] Possible Vicarious Liability for Computer Users in the USA.pdf                                                   12-Aug-2017 08:53   74K  
[   ] Potential Threats to WAP Enabled Devices.pdf                                                                     12-Aug-2017 08:53  129K  
[   ] Powerful virus hits computers.pdf                                                                                12-Aug-2017 08:53  100K  
[   ] Practical Detection of Metamorphic Computer Viruses.pdf                                                          12-Aug-2017 08:53  1.1M  
[   ] Practical overview of a Xen covert channel.pdf                                                                   12-Aug-2017 08:53  1.1M  
[   ] Predators Good Will Mobile Codes Combat against Computer Viruses.pdf                                             12-Aug-2017 08:53  514K  
[   ] Prepared testimony and statement for the record on computer virus legislation.pdf                                12-Aug-2017 08:53  1.5M  
[   ] Prescription Medicine.pdf                                                                                        12-Aug-2017 08:53   52K  
[   ] Principles of a Computer Immune System.pdf                                                                       12-Aug-2017 08:53   58K  
[   ] Procedures To Reduce The Computer Virus Threat.pdf                                                               12-Aug-2017 08:53  1.0M  
[   ] Profile hidden Markov models and metamorphic virus detection.pdf                                                 12-Aug-2017 08:53  865K  
[   ] Profiles in cyber courage.pdf                                                                                    12-Aug-2017 08:53  331K  
[   ] Prophet and loss.pdf                                                                                             12-Aug-2017 08:53   72K  
[   ] Prophylaxis for virus propagation and general computer security policy.pdf                                       12-Aug-2017 08:53  617K  
[   ] Prosecuting Computer Virus Authors The Need for an Adequate and Immediate International Solution.pdf             12-Aug-2017 08:53  122K  
[   ] Protection of computer systems from computer viruses ethical and practical issues.pdf                            12-Aug-2017 08:53   43K  
[   ] Quantitative risk assessment of computer virus attacks on computer networks.pdf                                  12-Aug-2017 08:53  961K  
[   ] Quantum Malware.pdf                                                                                              12-Aug-2017 08:53  273K  
[   ] Queuing theory based models for studying intrusion evolution and elimination in computer networks.pdf            12-Aug-2017 08:53  277K  
[   ] RFID Security Issues in Military Supply Chains.pdf                                                               12-Aug-2017 08:53  250K  
[   ] Raised hacklez.pdf                                                                                               12-Aug-2017 08:53   50K  
[   ] Real world anti-virus product reviews and evaluations - the current state of affairs.pdf                         12-Aug-2017 08:53   59K  
[   ] Real-Time Virus Detection System Using iNetmon Engine.pdf                                                        12-Aug-2017 08:53   21K  
[   ] Rebels for the System Virus writers, general intellect, cyberpunk and criminal capitalism.pdf                    12-Aug-2017 08:53  202K  
[   ] Recent Worms A Survey and Trends.pdf                                                                             12-Aug-2017 08:53  268K  
[   ] Reductions of the general virus detection problem.pdf                                                            12-Aug-2017 08:53   57K  
[   ] Reflections on Trusting Trust.pdf                                                                                12-Aug-2017 08:53  220K  
[   ] Reliable Identification of Bounded-length Viruses is NP-complete.pdf                                             12-Aug-2017 08:53   70K  
[   ] Reply to Comment on  Framework for Modelling Trojans and Computer Virus Infection by E. Makinen.pdf              12-Aug-2017 08:53   39K  
[   ] Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen - Thimbleby.pdf   12-Aug-2017 08:53   59K  
[   ] Reports of computer viruses on the increase.pdf                                                                  12-Aug-2017 08:53   88K  
[   ] Research in Computer Viruses and Worms.pdf                                                                       12-Aug-2017 08:53  349K  
[   ] Resolution based metamorphic computer virus detection using redundancy control strategy.pdf                      12-Aug-2017 08:53   79K  
[   ] Response to the Proposal for a Virus database.pdf                                                                12-Aug-2017 08:53  296K  
[   ] Revealing Packed Malware.pdf                                                                                     12-Aug-2017 08:53  153K  
[   ] Reverse Code Engineering An In-Depth Analysis of the Bagle Virus.pdf                                             12-Aug-2017 08:53  1.2M  
[   ] Reverse Engineering Malware.pdf                                                                                  12-Aug-2017 08:53  351K  
[   ] Rogue Computer Programs.pdf                                                                                      12-Aug-2017 08:53  4.3M  
[   ] Rootkit Hunting vs. Compromise Detection.pdf                                                                     12-Aug-2017 08:53  340K  
[   ] Rootkits - Detection and prevention.pdf                                                                          12-Aug-2017 08:53  930K  
[   ] Rootkits - The new wave of invisible malware is here.pdf                                                         12-Aug-2017 08:53   30K  
[   ] Rootkits Analysis and Detection.pdf                                                                              12-Aug-2017 08:53  190K  
[   ] Rotalum A Tool for Automatic Reverse Engineering of Malware Emulators.pdf                                        12-Aug-2017 08:53  1.5M  
[   ] Routing Worm A Fast, Selective Attack Worm based on IP Address Information.pdf                                   12-Aug-2017 08:53  149K  
[   ] Running head REVERSE ENGINEERING MALWARE.pdf                                                                     12-Aug-2017 08:53   81K  
[   ] SBMDS an interpretable string based malware detection system using SVM ensemble with bagging.pdf                 12-Aug-2017 08:53  533K  
[   ] SPARSE A Hybrid System to Detect Malcode-Bearing Documents.pdf                                                   12-Aug-2017 08:53  1.2M  
[   ] Sandbox Technology Inside AV Scanners.pdf                                                                        12-Aug-2017 08:53  241K  
[   ] Scalable, Behavior-Based Malware Clustering.pdf                                                                  12-Aug-2017 08:53  462K  
[   ] Scary Networks Viruses as Discursive Practice.pdf                                                                12-Aug-2017 08:53  145K  
[   ] Securing Instant Messaging.pdf                                                                                   12-Aug-2017 08:53  207K  
[   ] Selbstreproduktion bei programmen.pdf                                                                            12-Aug-2017 08:53   38M  
[   ] Self- information systems why not.pdf                                                                            12-Aug-2017 08:53  120K  
[   ] Self-Nonself Discrimination in a Computer.pdf                                                                    12-Aug-2017 08:53  205K  
[   ] Self-Replicating Turing Machines and Computer Viruses.pdf                                                        12-Aug-2017 08:53   48K  
[   ] Self-reproducing machines.pdf                                                                                    12-Aug-2017 08:53  315K  
[   ] Semantics-Aware Malware Detection.pdf                                                                            12-Aug-2017 08:53  231K  
[   ] Seminar Report on Study of Viruses and Worms.pdf                                                                 12-Aug-2017 08:53  152K  
[   ] Server-based Virus-protection On UnixLinux.pdf                                                                   12-Aug-2017 08:53  684K  
[   ] Shadow Walker - Raising The Bar For Rootkit Detection.pdf                                                        12-Aug-2017 08:53  557K  
[   ] Shield -- A First Line Worm Defense.pdf                                                                          12-Aug-2017 08:53  362K  
[   ] Shield Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits.pdf                      12-Aug-2017 08:53  195K  
[   ] Should We Teach Virus Writing.pdf                                                                                12-Aug-2017 08:53  1.1M  
[   ] Signature Generation and Detection of Malware Families.pdf                                                       12-Aug-2017 08:53  287K  
[   ] Simulating Bandwidth-Limited Worms, One Graph to Rule Them All.pdf                                               12-Aug-2017 08:53   72K  
[   ] Simulating and optimising worm propagation algorithms.pdf                                                        12-Aug-2017 08:53  268K  
[   ] Simulating malware with MAlSim.pdf                                                                               12-Aug-2017 08:53  1.4M  
[   ] SinFP, unification of active and passive operating system fingerprinting.pdf                                     12-Aug-2017 08:53  364K  
[   ] SirCamstantial Evidence.pdf                                                                                      12-Aug-2017 08:53  148K  
[   ] Slack Space Sculpting the computer monsters -- virus inspiration.pdf                                             12-Aug-2017 08:53  193K  
[   ] Slackspace.pdf                                                                                                   12-Aug-2017 08:53   22K  
[   ] Slamdunk.pdf                                                                                                     12-Aug-2017 08:53   43K  
[   ] Sleep-Inducing.pdf                                                                                               12-Aug-2017 08:53   21K  
[   ] Small treatise about e-manipulation for honest people.pdf                                                        12-Aug-2017 08:53  915K  
[   ] SmartSiren Virus Detection and Alert for Smartphones.pdf                                                         12-Aug-2017 08:53  509K  
[   ] Sobig, sobigger, sobiggest.pdf                                                                                   12-Aug-2017 08:53  447K  
[   ] Software Diversity as a Defense Against Viral Propagation Models and Simulations.pdf                             12-Aug-2017 08:53  190K  
[   ] Software Transformations to Improve Malware Detection.pdf                                                        12-Aug-2017 08:53  307K  
[   ] Software Vaccine Technique and Its Application in Early Virus Finding and Tracing.pdf                            12-Aug-2017 08:53  165K  
[   ] Some Further Theoretical Results about Computer Viruses.pdf                                                      12-Aug-2017 08:53  1.6M  
[   ] Some human dimensions of computer virus creation and infection.pdf                                               12-Aug-2017 08:53  156K  
[   ] Something smells fishy.pdf                                                                                       12-Aug-2017 08:53   39K  
[   ] Source Code Analysis of Worms.pdf                                                                                12-Aug-2017 08:53  290K  
[   ] Specification and evaluation of polymorphic shellcode properties using a new temporal logic.pdf                  12-Aug-2017 08:53  786K  
[   ] Spyware & Rootkits.pdf                                                                                           12-Aug-2017 08:53   71K  
[   ] Spyware A Little Knowledge is a Wonderful Thing.pdf                                                              12-Aug-2017 08:54   89K  
[   ] Spyware and Rootkits - The Future Convergence.pdf                                                                12-Aug-2017 08:54   94K  
[   ] Stack Shape Analysis to Detect Obfuscated calls in Binaries.pdf                                                  12-Aug-2017 08:54  182K  
[   ] Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf                                                12-Aug-2017 08:54   68K  
[   ] Static Analysis of Executables to Detect Malicious Patterns.pdf                                                  12-Aug-2017 08:54  303K  
[   ] Static Detection of Malicious Code in Executable Programs.pdf                                                    12-Aug-2017 08:54  792K  
[   ] Static detection and identification of X86 malicious executables A multidisciplinary approach.pdf                12-Aug-2017 08:54  688K  
[   ] Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware.pdf                    12-Aug-2017 08:54  148K  
[   ] Stay Safe Online Campaign's AntiVirus Presentation.pdf                                                           12-Aug-2017 08:54  200K  
[   ] Stochastic Features of Computer Viruses.pdf                                                                      12-Aug-2017 08:54   96K  
[   ] Stoned Bootkit.pdf                                                                                               12-Aug-2017 08:54  1.2M  
[   ] Striking Similarities.pdf                                                                                        12-Aug-2017 08:54   47K  
[   ] Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis the Bradley Virus.pdf                     12-Aug-2017 08:54  196K  
[   ] Structuring ethical curricula in the information age.pdf                                                         12-Aug-2017 08:54  107K  
[   ] SubVirt Implementing malware with virtual machines.pdf                                                           12-Aug-2017 08:54  205K  
[   ] Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection.pdf                           12-Aug-2017 08:54  209K  
[   ] Supervisory control of malicious executables.pdf                                                                 12-Aug-2017 08:54  463K  
[   ] Superworms and Cryptovirology a Deadly Combination.pdf                                                           12-Aug-2017 08:54  153K  
[   ] Suppressing the spread of email malcode using short-term message recall.pdf                                      12-Aug-2017 08:54  151K  
[   ] Survey on Malware Detection Methods.pdf                                                                          12-Aug-2017 08:54  159K  
[   ] SweetBait Zero-Hour Worm Detection and Containment Using Honeypots.pdf                                           12-Aug-2017 08:54  210K  
[   ] System Dynamic Model for Computer Virus Prevalance.pdf                                                           12-Aug-2017 08:54  570K  
[   ] System and method for detecting malicious executable code.pdf                                                    12-Aug-2017 08:54  163K  
[   ] TAU cure for computer viruses.pdf                                                                                12-Aug-2017 08:54  119K  
[   ] THE MALICIOUS LOGIC BATTLE UNDERSTANDING THE ENEMY.pdf                                                           12-Aug-2017 08:54   47K  
[   ] TIBS.pdf                                                                                                         12-Aug-2017 08:55  516K  
[   ] TTAnalyze A Tool for Analyzing Malware.pdf                                                                       12-Aug-2017 08:55  371K  
[   ] Taiwan's first ever political computer virus.pdf                                                                 12-Aug-2017 08:54  281K  
[   ] Taking a Lesson from Stealthy Rootkits.pdf                                                                       12-Aug-2017 08:54  217K  
[   ] Taking the redpill Artificial Evolution in native x86 systems.pdf                                                12-Aug-2017 08:54  370K  
[   ] Taming Lakatos' Monster - Computer Virus Epidemics and Internet Security Policy.pdf                              12-Aug-2017 08:54   39K  
[   ] Taxonomy and Effectiveness of Worm Defense Strategies.pdf                                                        12-Aug-2017 08:54  488K  
[   ] Techniques_virales_avances.pdf                                                                                   12-Aug-2017 08:54   18M  
[   ] Technological Turf Wars A Case Study of the Computer Antivirus Industry.pdf                                      12-Aug-2017 08:54  1.7M  
[   ] Technologically Enabled Crime Shifting Paradigms for the Year 2000.pdf                                           12-Aug-2017 08:54  1.4M  
[   ] Testing Malware Detectors.pdf                                                                                    12-Aug-2017 08:54  339K  
[   ] Testing Time for Antivirus Software.pdf                                                                          12-Aug-2017 08:54  1.4M  
[   ] Testing and evaluating virus detectors for handheld devices.pdf                                                  12-Aug-2017 08:54  227K  
[   ] Testing the SETIHacker Hypothesis.pdf                                                                            12-Aug-2017 08:54  673K  
[   ] The ABC of computer security.pdf                                                                                 12-Aug-2017 08:54  105K  
[   ] The Application of Epidemiology to Computer Viruses.pdf                                                          12-Aug-2017 08:54  589K  
[   ] The Art of Computer Virus Research and Defense.pdf                                                               12-Aug-2017 08:54  9.9M  
[   ] The Art of File Format Fuzzing.pdf                                                                               12-Aug-2017 08:54  1.1M  
[   ] The Asexual Virus Computer Viruses in Feminist Discourse.pdf                                                     12-Aug-2017 08:54  117K  
[   ] The Basic Building Blocks of Malware.pdf                                                                         12-Aug-2017 08:54  267K  
[   ] The Bite of the Computer Virus.pdf                                                                               12-Aug-2017 08:54  3.8K  
[   ] The Blaster Worm - The View from 10,000 feet.pdf                                                                 12-Aug-2017 08:54  830K  
[   ] The Brains Behind the Operation.pdf                                                                              12-Aug-2017 08:54   21K  
[   ] The Bulgarian Computer Virus Factory.pdf                                                                         12-Aug-2017 08:54  9.5K  
[   ] The Bulgarian and Soviet Virus Factories.pdf                                                                     12-Aug-2017 08:54  213K  
[   ] The Case for Beneficial Computer Viruses and Worms.pdf                                                           12-Aug-2017 08:54   43K  
[   ] The Case for Using Layered Defenses to Stop Worms.pdf                                                            12-Aug-2017 08:54  174K  
[   ] The Challenge of Being Prepared for Tomorrows MalWare Today.pdf                                                  12-Aug-2017 08:54   42K  
[   ] The Code Red Worm.pdf                                                                                            12-Aug-2017 08:54  148K  
[   ] The Code of Life A look at emerging Artificial Life.pdf                                                          12-Aug-2017 08:54  154K  
[   ] The Computer Virus -- From There to Here.pdf                                                                     12-Aug-2017 08:54  211K  
[   ] The Computer Virus Culture.pdf                                                                                   12-Aug-2017 08:54   77K  
[   ] The Cornell Commission On Morris and the Worm.pdf                                                                12-Aug-2017 08:54  404K  
[   ] The Costly Implications of Consulting in a Virus-Infected Computer Environment.pdf                               12-Aug-2017 08:54  458K  
[   ] The Danger Theory and Its Application to Artificial Immune Systems.pdf                                           12-Aug-2017 08:54  210K  
[   ] The Dangers of Computer Viruses Implications for 21st Century Educators.pdf                                      12-Aug-2017 08:54  9.0M  
[   ] The Design Space of Metamorphic Malware.pdf                                                                      12-Aug-2017 08:54  102K  
[   ] The Ecology of Malware.pdf                                                                                       12-Aug-2017 08:54  150K  
[   ] The Effect of DNS Delays on Worm Propagation in an IPv6 Internet.pdf                                             12-Aug-2017 08:54  175K  
[   ] The Emergence of the Posthuman Consumer and the Fusion of the Virtual and the Real.pdf                           12-Aug-2017 08:54  1.0M  
[   ] The Engine of the Underground The Elite-Kiddie Divide.pdf                                                        12-Aug-2017 08:54  159K  
[   ] The Evolution of Viruses and Worms.pdf                                                                           12-Aug-2017 08:54  133K  
[   ] The Evolution of the Computer Virus.pdf                                                                          12-Aug-2017 08:54   62K  
[   ] The Evolving Virus Threat.pdf                                                                                    12-Aug-2017 08:54   46K  
[   ] The Father Christmas worm.pdf                                                                                    12-Aug-2017 08:54  570K  
[   ] The Future of Bot Worms.pdf                                                                                      12-Aug-2017 08:54   61K  
[   ] The Future of Internet Worms.pdf                                                                                 12-Aug-2017 08:54  190K  
[   ] The Future of Malware.pdf                                                                                        12-Aug-2017 08:54   81K  
[   ] The Giant Black Book of Computer Viruses (2nd ed.).pdf                                                           12-Aug-2017 08:54  1.7M  
[   ] The Giant Black Book of Computer Viruses.pdf                                                                     12-Aug-2017 08:54  5.7M  
[   ] The Impact of Countermeasure Propagation on the Prevalence of Computer Viruses.pdf                               12-Aug-2017 08:54  581K  
[   ] The Impact of Countermeasure Spreading on the Prevalence of Computer Viruses.pdf                                 12-Aug-2017 08:54  124K  
[   ] The Internet Motion Sensor A Distributed Blackhole Monitoring System.pdf                                         12-Aug-2017 08:54  646K  
[   ] The Internet Worm Incident.pdf                                                                                   12-Aug-2017 08:54  100K  
[   ] The Internet Worm Program An Analysis.pdf                                                                        12-Aug-2017 08:54  2.3M  
[   ] The Java mobile risk.pdf                                                                                         12-Aug-2017 08:54  127K  
[   ] The Latest Malware Threats Against Your PC.pdf                                                                   12-Aug-2017 08:54  511K  
[   ] The Legislative Response to the Evolution of Computer Viruses.pdf                                                12-Aug-2017 08:54  215K  
[   ] The Little Black Book of Computer Viruses.pdf                                                                    12-Aug-2017 08:54  1.4M  
[   ] The More Things Change....pdf                                                                                    12-Aug-2017 08:54   73K  
[   ] The Norman Book on Computer Viruses.pdf                                                                          12-Aug-2017 08:54  388K  
[   ] The Pathology of Computer Viruses.pdf                                                                            12-Aug-2017 08:54  1.4M  
[   ] The Race Against Malicious Software.pdf                                                                          12-Aug-2017 08:54   50K  
[   ] The Real Cost of a Virus Outbreak.pdf                                                                            12-Aug-2017 08:54   62K  
[   ] The Rise of AutoRunBased Malware.pdf                                                                             12-Aug-2017 08:54  1.7M  
[   ] The Risk of Debug Codes in Batch what are debug codes and why they are dangerous.pdf                             12-Aug-2017 08:54  184K  
[   ] The Role of Internet Service Providers in Botnet Mitigation An Empirical Analysis Based on Spam Data.pdf         12-Aug-2017 08:54  1.2M  
[   ] The SASSER Event History and Implications.pdf                                                                    12-Aug-2017 08:54  653K  
[   ] The Shockwave Rider.pdf                                                                                          12-Aug-2017 08:54  1.4M  
[   ] The Social Psychology of Computer Viruses and Worms.pdf                                                          12-Aug-2017 08:54  148K  
[   ] The Use of Heuristics in Identifying Self-Propagating Malicious Mobile Code.pdf                                  12-Aug-2017 08:54  1.8M  
[   ] The Virtual Artaud Computer Virus as Performance Art.pdf                                                         12-Aug-2017 08:54  321K  
[   ] The Virus Hunter.pdf                                                                                             12-Aug-2017 08:55  111K  
[   ] The Virus Underground.pdf                                                                                        12-Aug-2017 08:55   90K  
[   ] The Virus is Worse than the Cure.pdf                                                                             12-Aug-2017 08:55  120K  
[   ] The WiT virus A virus built on the ViT ELF virus.pdf                                                             12-Aug-2017 08:55  419K  
[   ] The Worm Programs - Early Experience with a Distributed Computation.pdf                                          12-Aug-2017 08:55  870K  
[   ] The Worm Programs--Early Experience with a Distributed Intelligence.pdf                                          12-Aug-2017 08:55  925K  
[   ] The Zombie Roundup Understanding, Detecting, and Disrupting Botnets.pdf                                          12-Aug-2017 08:55  212K  
[   ] The biology of digital organisms.pdf                                                                             12-Aug-2017 08:54   42K  
[   ] The cause and effects of computer viruses.pdf                                                                    12-Aug-2017 08:54   31K  
[   ] The dynamics of computer virus infection.pdf                                                                     12-Aug-2017 08:54  205K  
[   ] The future of virus detection.pdf                                                                                12-Aug-2017 08:54  113K  
[   ] The geneology of malware.pdf                                                                                     12-Aug-2017 08:54  785K  
[   ] The impact of Microsoft Windows infection vectors on IP network traffic patterns.pdf                             12-Aug-2017 08:54  593K  
[   ] The malware naming chaos.pdf                                                                                     12-Aug-2017 08:54   59K  
[   ] The metamorphosis of malware writers.pdf                                                                         12-Aug-2017 08:54   83K  
[   ] The missing LNK.pdf                                                                                              12-Aug-2017 08:54   47K  
[   ] The motivation behind computer viruses.pdf                                                                       12-Aug-2017 08:54   97K  
[   ] The road less truvelled.pdf                                                                                      12-Aug-2017 08:54   39K  
[   ] The solution in the naming chaos.pdf                                                                             12-Aug-2017 08:54  135K  
[   ] The worm that turned A social use of computer viruses.pdf                                                        12-Aug-2017 08:55  2.7M  
[   ] The wormpipe strikes back.pdf                                                                                    12-Aug-2017 08:55   64K  
[   ] TheV-Files A dictionary of file threats.pdf                                                                      12-Aug-2017 08:55  135K  
[   ] There Are No Safe Virus Tests.pdf                                                                                12-Aug-2017 08:55  209K  
[   ] There Is No Ideal Virus Scanner.pdf                                                                              12-Aug-2017 08:55  183K  
[   ] Those ubiquitous viruses.pdf                                                                                     12-Aug-2017 08:55   43K  
[   ] Thoughts about Cross-View based Rootkit Detection.pdf                                                            12-Aug-2017 08:55   99K  
[   ] Threats to Digitization Computer Virus.pdf                                                                       12-Aug-2017 08:55   89K  
[   ] Throttling Viruses Restricting propagation to defeat malicious mobile code.pdf                                   12-Aug-2017 08:55  122K  
[   ] Time machine.pdf                                                                                                 12-Aug-2017 08:55   32K  
[   ] Timing Rootkits.pdf                                                                                              12-Aug-2017 08:55   60K  
[   ] To catch Efish.pdf                                                                                               12-Aug-2017 08:55   60K  
[   ] Tools for Finding and Removing Rootkits.pdf                                                                      12-Aug-2017 08:55  418K  
[   ] Toward an abstract computer virology.pdf                                                                         12-Aug-2017 08:55  189K  
[   ] Towards Automated Defense from Rootkit Attacks.pdf                                                               12-Aug-2017 08:55  164K  
[   ] Towards Stealthy Malware Detection.pdf                                                                           12-Aug-2017 08:55  861K  
[   ] Towards Systematic Evaluation of the Evadability of Bot,Botnet Detection Methods.pdf                             12-Aug-2017 08:55  314K  
[   ] Towards an undetectable computer virus.pdf                                                                       12-Aug-2017 08:55  1.1M  
[   ] Trap E-mail Address for Combating E-mail Viruses.pdf                                                             12-Aug-2017 08:55   70K  
[   ] Trapping Viruses.pdf                                                                                             12-Aug-2017 08:55   68K  
[   ] Treating scalability and modelling human countermeasures against local preference worms via gradient models.pdf  12-Aug-2017 08:55  290K  
[   ] Trends in Viruses and Worms.pdf                                                                                  12-Aug-2017 08:55  165K  
[   ] Trends of Spyware, Viruses and Exploits.pdf                                                                      12-Aug-2017 08:55   78K  
[   ] Trojan White Paper.pdf                                                                                           12-Aug-2017 08:55  1.8M  
[   ] Trojans Worms and Spyware A Computer Security Professional's Guide to Malicious Code.pdf                         12-Aug-2017 08:55  1.3M  
[   ] Tumours and polips.pdf                                                                                           12-Aug-2017 08:55   67K  
[   ] Turing Machines and Undecidability with Special Focus on Computer Viruses.pdf                                    12-Aug-2017 08:55  284K  
[   ] Twinkle, twinkle little star.pdf                                                                                 12-Aug-2017 08:55   60K  
[   ] Two Bills Equal Forewarning.pdf                                                                                  12-Aug-2017 08:55  323K  
[   ] USC-OIA Special Virus Report.pdf                                                                                 12-Aug-2017 08:55  643K  
[   ] Ukrainian-Russian Hackers the Stealth Group and Its Leader, LovinGOD.pdf                                         12-Aug-2017 08:55  256K  
[   ] Un combate con el Kerado.pdf                                                                                     12-Aug-2017 08:55   41K  
[   ] Understanding Computer Viruses.pdf                                                                               12-Aug-2017 08:55  779K  
[   ] Understanding Virus Behavior in 32-bit Operating Environments.pdf                                                12-Aug-2017 08:55   65K  
[   ] Understanding and Managing Polymorphic Viruses.pdf                                                               12-Aug-2017 08:55   94K  
[   ] Unexpected Resutls [sic].pdf                                                                                     12-Aug-2017 08:55   39K  
[   ] Universal Procedures to Protect Against Computer Viruses.pdf                                                     12-Aug-2017 08:55  6.2K  
[   ] Unknown Computer Virus Detection Inspired by Immunity.pdf                                                        12-Aug-2017 08:55  430K  
[   ] Unknown Malcode Detection and the Imbalance Problem.pdf                                                          12-Aug-2017 08:55  1.2M  
[   ] Unknown Malcode Detection via Text Categorization and the Imbalance Problem.pdf                                  12-Aug-2017 08:55  171K  
[   ] Unknown Malicious Code Detection # Practical Issues.pdf                                                          12-Aug-2017 08:55  162K  
[   ] Unpredictable Legacies Viral Games in the Networked World.pdf                                                    12-Aug-2017 08:55  200K  
[   ] Use of an Attenuated Computer Virus as a Mechanism for Teaching Epidemiology.pdf                                 12-Aug-2017 08:55  320K  
[   ] User-mode memory scanning on 32-bit & 64-bit windows.pdf                                                         12-Aug-2017 08:55  262K  
[   ] Using Code Normalization for Fighting Self-Mutating Malware.pdf                                                  12-Aug-2017 08:55  121K  
[   ] Using Engine Signature to Detect Metamorphic Malware.pdf                                                         12-Aug-2017 08:55  266K  
[   ] Using Entropy Analysis to Find Encrypted and Packed Malware.pdf                                                  12-Aug-2017 08:55  467K  
[   ] Using Formal Grammar and Genetic Operators to Evolve Malware.pdf                                                 12-Aug-2017 08:55  388K  
[   ] Using Malware to Improve Software Quality and Security.pdf                                                       12-Aug-2017 08:55  160K  
[   ] Using Markov Chains to Filter Machine-morphed Variants of Malicious Programs.pdf                                 12-Aug-2017 08:55   96K  
[   ] Using Plant Epidemiological Methods To Track Computer Network Worms.pdf                                          12-Aug-2017 08:55  2.3M  
[   ] Using Predators to Combat Worms and Viruses A Simulation-Based Study.pdf                                         12-Aug-2017 08:55  572K  
[   ] Using Qualia and Hierarchical Models in Malware Detection.pdf                                                    12-Aug-2017 08:55  141K  
[   ] Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection.pdf        12-Aug-2017 08:55  513K  
[   ] Using Support Vector Machine to Detect Unknown Computer Viruses.pdf                                              12-Aug-2017 08:55  359K  
[   ] Using Verification Technology to Specify and Detect Malware.pdf                                                  12-Aug-2017 08:55   81K  
[   ] Using Virtualisation to Protect Against Zero-Day Attacks.pdf                                                     12-Aug-2017 08:55  1.1M  
[   ] Using biological models to improve innovation systems.pdf                                                        12-Aug-2017 08:55  201K  
[   ] Using the KBTA method for inferring computer and network security.pdf                                            12-Aug-2017 08:55  1.8M  
[   ] Utilizing Entropy to Identify Undetected Malware.pdf                                                             12-Aug-2017 08:55  491K  
[   ] VIRUS, Very Important Resource Under Siege.pdf                                                                   12-Aug-2017 08:55   38K  
[   ] VT Integrity Services for Networking.pdf                                                                         12-Aug-2017 08:56  608K  
[   ] VX Reversing I, the basics.pdf                                                                                   12-Aug-2017 08:56  113K  
[   ] VX Reversing II, Sasser.B.pdf                                                                                    12-Aug-2017 08:56   92K  
[   ] Viral Attacks On UNIX System Security.pdf                                                                        12-Aug-2017 08:55  669K  
[   ] Viral Bodies, Virtual Practices.pdf                                                                              12-Aug-2017 08:55  632K  
[   ] Viral Evolution.pdf                                                                                              12-Aug-2017 08:55  128K  
[   ] Viral Style Technology, Culture, and the Politics of Infection.pdf                                               12-Aug-2017 08:55   36K  
[   ] Viral polymorphism.pdf                                                                                           12-Aug-2017 08:55  161K  
[   ] Virentechniken Analyse und Metamorphismus.pdf                                                                    12-Aug-2017 08:55   64K  
[   ] Virii Generators Understanding the Threat.pdf                                                                    12-Aug-2017 08:55  282K  
[   ] Virology 101.pdf                                                                                                 12-Aug-2017 08:55   21K  
[   ] Virology_101(Usenix).pdf                                                                                         12-Aug-2017 08:55  359K  
[   ] Virus Detection System - VDS.pdf                                                                                 12-Aug-2017 08:55  575K  
[   ] Virus Inoculation on Social Graphs The Friendship Factor.pdf                                                     12-Aug-2017 08:55  217K  
[   ] Virus Prevention Without Signatures.pdf                                                                          12-Aug-2017 08:55  531K  
[   ] Virus Prevention, Cure and Hoaxes.pdf                                                                            12-Aug-2017 08:55  114K  
[   ] Virus Protection.pdf                                                                                             12-Aug-2017 08:55   80K  
[   ] Virus Scanners for Multiple OSes.pdf                                                                             12-Aug-2017 08:55  348K  
[   ] Virus Spread in Networks.pdf                                                                                     12-Aug-2017 08:55  436K  
[   ] Virus Techniques.pdf                                                                                             12-Aug-2017 08:55  402K  
[   ] Virus Trends 2003-2004.pdf                                                                                       12-Aug-2017 08:55  9.3K  
[   ] Virus Tutorial.pdf                                                                                               12-Aug-2017 08:55  2.7M  
[   ] Virus Verification and Removal Tools and Techniques.pdf                                                          12-Aug-2017 08:55  147K  
[   ] Virus Writers 360.pdf                                                                                            12-Aug-2017 08:55  369K  
[   ] Virus Writers The End of The Innocence.pdf                                                                       12-Aug-2017 08:55  109K  
[   ] Virus als Metapher.pdf                                                                                           12-Aug-2017 08:55  2.2M  
[   ] Virus attack - how computer networks could heal themselves.pdf                                                   12-Aug-2017 08:55   97K  
[   ] Virus authors faster to the kill.pdf                                                                             12-Aug-2017 08:55  142K  
[   ] Virus detection using datamining techniques.pdf                                                                  12-Aug-2017 08:55  297K  
[   ] Virus ex machina res ipsa loquitur.pdf                                                                           12-Aug-2017 08:55  568K  
[   ] VirusMeter  Preventing Your Cellphone from Spies.pdf                                                             12-Aug-2017 08:56  463K  
[   ] Viruses & spam fuel new laws.pdf                                                                                 12-Aug-2017 08:55  156K  
[   ] Viruses 101.pdf                                                                                                  12-Aug-2017 08:55   92K  
[   ] Viruses Are Beginning to Get to Me!.pdf                                                                          12-Aug-2017 08:55  116K  
[   ] Viruses Are Not Speech.pdf                                                                                       12-Aug-2017 08:55   79K  
[   ] Viruses Bottleneck Prosecution.pdf                                                                               12-Aug-2017 08:55  349K  
[   ] Viruses Revealed Understanding and Counter Malicious Software.pdf                                                12-Aug-2017 08:56   50M  
[   ] Viruses That Intricate Yarn.pdf                                                                                  12-Aug-2017 08:56   93K  
[   ] Viruses a concern for all of us.pdf                                                                              12-Aug-2017 08:55   59K  
[   ] Viruses and Computer Security.pdf                                                                                12-Aug-2017 08:55  185K  
[   ] Viruses and Criminal Law.pdf                                                                                     12-Aug-2017 08:55  729K  
[   ] Viruses and Lotus Notes- Have the Virus Writers Finally Met Their Match.pdf                                      12-Aug-2017 08:55  204K  
[   ] Viruses and Worms The Best Defense is Awareness.pdf                                                              12-Aug-2017 08:55  277K  
[   ] Viruses and Worms The Inside Story.pdf                                                                           12-Aug-2017 08:55  414K  
[   ] Viruses and Worms--What Can You Do.pdf                                                                           12-Aug-2017 08:55  1.2M  
[   ] Viruses and Worms.pdf                                                                                            12-Aug-2017 08:55  311K  
[   ] Viruses and the Law.pdf                                                                                          12-Aug-2017 08:55  155K  
[   ] Viruses in France The French Connection - II.pdf                                                                 12-Aug-2017 08:55  121K  
[   ] Viruses using .NET Framework.pdf                                                                                 12-Aug-2017 08:56   40K  
[   ] Viruses, Worms, Zombies, and other Beasties.pdf                                                                  12-Aug-2017 08:56  1.1M  
[   ] Viruses, Worms, and Trojan Horses Serious Crimes, Nuisance, or Both.pdf                                          12-Aug-2017 08:56  142K  
[   ] Visualizing Windows Executable Viruses Using Self-Organizing Maps.pdf                                            12-Aug-2017 08:56  531K  
[   ] Vulnerabilities as monsters the cultural foundations of computer security (extended abstract).pdf                12-Aug-2017 08:56   67K  
[   ] Vx-trading.pdf                                                                                                   12-Aug-2017 08:56   71K  
[   ] WORM AND VIRUS DEFENSE HOW CAN WE PROTECT THE NATION'S COMPUTERS FROM THESE THREATS.pdf                          12-Aug-2017 08:56  5.6M  
[   ] Warnings of a Dark Future The Emergence of Machine Intelligence.pdf                                              12-Aug-2017 08:56   93K  
[   ] Web Sites Hawk Instructions On Making Computer Viruses.pdf                                                       12-Aug-2017 08:56  8.5K  
[   ] What is Wild.pdf                                                                                                 12-Aug-2017 08:56   83K  
[   ] What's in a Name.pdf                                                                                             12-Aug-2017 08:56   59K  
[   ] What's the difference between a Virus, Worm, and Trojan horse.pdf                                                12-Aug-2017 08:56   22K  
[   ] When Computer Viruses Strike.pdf                                                                                 12-Aug-2017 08:56  130K  
[   ] When Java Was One Threats From Hostile Byte Code.pdf                                                             12-Aug-2017 08:56   38K  
[   ] When Malware Meets Rootkits.pdf                                                                                  12-Aug-2017 08:56  493K  
[   ] Where have the worms and viruses gone - new trends in malware.pdf                                                12-Aug-2017 08:56   91K  
[   ] White-box attack context cryptovirology.pdf                                                                      12-Aug-2017 08:56  301K  
[   ] Why Anti-Virus Software Cannot Stop the Spread of Email Worms.pdf                                                12-Aug-2017 08:56  129K  
[   ] Windows Rootkit Overview.pdf                                                                                     12-Aug-2017 08:56   95K  
[   ] Windows Rootkits.pdf                                                                                             12-Aug-2017 08:56  146K  
[   ] Winning the battles, losing the war Rethinking methodology for forensic computing research.pdf                   12-Aug-2017 08:56  139K  
[   ] With Microscope and Tweezers An Analysis of the Internet Virus of November 1988.pdf                              12-Aug-2017 08:56  193K  
[   ] With Microscope and Tweezers The Worm from MITS Perspective.pdf                                                  12-Aug-2017 08:56  1.2M  
[   ] Worm Analysis through Computer Simulation.pdf                                                                    12-Aug-2017 08:56  318K  
[   ] Worm Anatomy and Model.pdf                                                                                       12-Aug-2017 08:56  267K  
[   ] Worm Detection Using Local Networks.pdf                                                                          12-Aug-2017 08:56  372K  
[   ] Worm Epidemics in High-Speed Networks.pdf                                                                        12-Aug-2017 08:56  145K  
[   ] Worm Epidemiology.pdf                                                                                            12-Aug-2017 08:56  352K  
[   ] Worm Hotspots Explaining Non-Uniformity in Worm Targeting Behavior.pdf                                           12-Aug-2017 08:56  383K  
[   ] Worm Meets Beehive.pdf                                                                                           12-Aug-2017 08:56  298K  
[   ] Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense.pdf                                      12-Aug-2017 08:56  253K  
[   ] Worm wars.pdf                                                                                                    12-Aug-2017 08:56  447K  
[   ] Worms of the future.pdf                                                                                          12-Aug-2017 08:56  192K  
[   ] Writing disassembler.pdf                                                                                         12-Aug-2017 08:56   27K  
[   ] You've got M()a(D)i(L+K)l.pdf                                                                                    12-Aug-2017 08:56   41K  
[   ] Young Nussbaum Monin PSPB 2007.pdf                                                                               12-Aug-2017 08:56  194K  
[   ] Zero-hour, Real-time Computer Virus Defense through Collaborative Filtering.pdf                                  12-Aug-2017 08:56   70K  
[   ] Zeroing in on Metamorphic Computer Viruses.pdf                                                                   12-Aug-2017 08:56  402K  
[   ] Zmist Opportunities.pdf                                                                                          12-Aug-2017 08:56  119K  
[   ] creation dun Web Worm.pdf                                                                                        12-Aug-2017 08:49  155K  
[   ] polyunpack.pdf                                                                                                   12-Aug-2017 08:53  372K  


© 2013-2017 - nnt.es


email feed