nnt.es


Imagen


Icon  Name                                                                                                             Size  
[   ] 64-bit rugrats.pdf                                                                                                30K  
[   ] A Bypass of Cohen's Impossibility Result.pdf                                                                     107K  
[   ] A Classification of Viruses through Recursion Theorems.pdf                                                       157K  
[   ] A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed.pdf                              1.0M  
[   ] A Computational Model of Computer Virus Propagation.pdf                                                           14K  
[   ] A Computer Virus Is A Thought Manifested.pdf                                                                     5.6K  
[   ] A Cooperative Immunization System for an Untrusting Internet.pdf                                                  75K  
[   ] A Cost Analysis of Typical Computer Viruses and Defenses.pdf                                                      91K  
[   ] A Critical Look at the Regulation of Computer Viruses.pdf                                                         96K  
[   ] A Distributed Approach against Computer Viruses Inspired by the Immune System.pdf                                509K  
[   ] A Dozen Dangerous Myths About Computer Viruses.pdf                                                               109K  
[   ] A Failure to Learn from the Past.pdf                                                                              95K  
[   ] A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows.pdf                                  320K  
[   ] A Feature Selection and Evaluation Scheme for Computer Virus Detection.pdf                                       230K  
[   ] A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.pdf                        139K  
[   ] A Formal Definition of Computer Worms and Some Related Results.pdf                                               1.1M  
[   ] A Framework for Deception.pdf                                                                                    2.7M  
[   ] A Framework to Detect Novel Computer Viruses via System Calls.pdf                                                311K  
[   ] A Generic Virus Detection Agent on the Internet.pdf                                                              560K  
[   ] A Generic Virus Scanner in C++.pdf                                                                                96K  
[   ] A History Of Computer Viruses - Introduction.pdf                                                                 373K  
[   ] A History Of Computer Viruses - The Famous `Trio'.pdf                                                            1.3M  
[   ] A History Of Computer Viruses - Three Special Viruses.pdf                                                        790K  
[   ] A Hybrid Model to Detect Malicious Executables.pdf                                                               246K  
[   ] A Hygiene Lesson.pdf                                                                                             212K  
[   ] A Mathematical Theory for the Spread of Computer Viruses.pdf                                                     400K  
[   ] A Memory Symptom-based Virus Detection Approach.pdf                                                              167K  
[   ] A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf                                                1.3M  
[   ] A Methodology to Detect and Characterize Kernel Level Rootkit Exploits.pdf                                       266K  
[   ] A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations.pdf                         338K  
[   ] A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf                                 164K  
[   ] A Network Worm Vaccine Architecture.pdf                                                                           71K  
[   ] A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS.pdf                                                     715K  
[   ] A Pact with the Devil.pdf                                                                                        106K  
[   ] A Plague of Viruses Biological, Computer and Marketing.pdf                                                       133K  
[   ] A Potency Relation for Worms and Next-Generation Attack Tools.pdf                                                282K  
[   ] A Proposed Taxonomy of Software Weapons.pdf                                                                      657K  
[   ] A Public Health Approach to Preventing Malware Propagation.pdf                                                   708K  
[   ] A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig.pdf                                 12K  
[   ] A Retrovirus Inspired Algorithm for Virus Detection & Optimization.pdf                                           343K  
[   ] A Self-reproducing Analogue.pdf                                                                                  304K  
[   ] A Semantics-Based Approach to Malware Detection.pdf                                                              344K  
[   ] A Sense of 'Danger' for Windows Processes.pdf                                                                    274K  
[   ] A Sense of Self for Unix Processes.pdf                                                                            68K  
[   ] A Short Course on Computer Viruses.pdf                                                                           715K  
[   ] A Short Visit to the Bot Zoo.pdf                                                                                 742K  
[   ] A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses.pdf                                    226K  
[   ] A Study of Detecting Computer Viruses in Real-Infected Files.pdf                                                 175K  
[   ] A Study of Malcode-Bearing Documents.pdf                                                                         1.1M  
[   ] A Survey of Cryptologic Issues in Computer Virology.pdf                                                          271K  
[   ] A Taxonomy of Computer Worms.pdf                                                                                 100K  
[   ] A Technique for Removing an Important Class of Trojan Horses from High Order Languages.pdf                        84K  
[   ] A Theoretical Superworm.pdf                                                                                      310K  
[   ] A Tour of the Worm.pdf                                                                                            70K  
[   ] A Trust System Based on Multi Level Virus Detection.pdf                                                          193K  
[   ] A Virtual Honeypot Framework.pdf                                                                                 451K  
[   ] A Web-Based Network Worm Simulator.pdf                                                                           145K  
[   ] A Worst-Case Worm.pdf                                                                                             66K  
[   ] A bit of viral protection is worth a megabyte of cure.pdf                                                        417K  
[   ] A fault tolerance approach to computer viruses.pdf                                                               680K  
[   ] A framework for modelling trojans and computer virus infection.pdf                                               228K  
[   ] A general definition of malware.pdf                                                                              407K  
[   ] A method to detect metamorphic computer viruses.pdf                                                              2.4M  
[   ] A note on Cohen's formal model for computer viruses.pdf                                                          182K  
[   ] A parallel String Matching Engine for use in high speed network intrusion detection systems.pdf                  375K  
[   ] A pilot study on college student's attitudes toward computer virus.pdf                                            74K  
[   ] A software authentication system for the prevention of computer viruses.pdf                                      379K  
[   ] A statistical model for undecidable viral detection.pdf                                                          276K  
[   ] A study of anti-virus' response to unknown threats.pdf                                                           142K  
[   ] A theoretical model of differential social attributions toward computing technology.pdf                          425K  
[   ] A unified prediction of computer virus spread in connected networks.pdf                                          163K  
[   ] A week is a long time in computer ethics.pdf                                                                      66K  
[   ] ACPI and SMI handlers some limits to trusted computing.pdf                                                       1.4M  
[   ] AGISA Towards Automatic Generation of Infection Signatures.pdf                                                   288K  
[   ] API Win32 ancestrales pour Chevaux de Troie hyper furtifs.pdf                                                    408K  
[   ] ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETECTORS.pdf                                                          72K  
[   ] ARTISTA A Network for ARTifical Immune SysTems.pdf                                                               391K  
[   ] ASM-based Modelling of Self-Replicating Programs.pdf                                                              93K  
[   ] AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION.pdf                                                       82K  
[   ] Abstract Detection of Computer Viruses.pdf                                                                       163K  
[   ] Abstraction-Based Intrusion Detection In Distributed Environments.pdf                                            577K  
[   ] Abstracts of Recent Articles and Literature.pdf                                                                   98K  
[   ] Accurately Detecting Source Code of Attacks That Increase Privilege.pdf                                          139K  
[   ] Acquisition of Malicious Code Using Active Learning.pdf                                                          155K  
[   ] Adequacy of Checksum Algorithms for Computer Virus Detection.pdf                                                 236K  
[   ] Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf                                         581K  
[   ] Advanced Metamorphic Techniques in Computer Viruses.pdf                                                          311K  
[   ] Advanced Polymorphic Techniques.pdf                                                                              532K  
[   ] Advanced Routing Worm and Its Security Challenges.pdf                                                            228K  
[   ] Advanced fuzzing in the VoIP space.pdf                                                                           504K  
[   ] Algebraic Specification of Computer Viruses and Their Environments.pdf                                           162K  
[   ] An Abstract Theory of Computer Viruses.pdf                                                                       730K  
[   ] An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code.pdf           67K  
[   ] An Approach to Containing Computer Viruses.pdf                                                                   1.0M  
[   ] An Approach towards Disassembly of Malicious Binary Executables.pdf                                              1.4M  
[   ] An Architecture for Generating Semantic-Aware Signatures.pdf                                                     263K  
[   ] An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques.pdf                     607K  
[   ] An Efficient Control of Virus Propagation.pdf                                                                    189K  
[   ] An Email Worm Vaccine Architecture.pdf                                                                           213K  
[   ] An Epidemic Model of Mobile Phone Virus.pdf                                                                       49K  
[   ] An Epidemiological View of Worms and Viruses.pdf                                                                 142K  
[   ] An Evaluation of Two Host Based Intrusion Prevention Systems.pdf                                                 171K  
[   ] An Internet-Worm Early Warning System.pdf                                                                         81K  
[   ] An Introduction to Computer Viruses.pdf                                                                           38K  
[   ] An Introduction to Intrusion-Detection Systems.pdf                                                               196K  
[   ] An OS Independent Heuristics-based Worm-containment System.pdf                                                   159K  
[   ] An Overview of Computer Viruses in a Research Environment.pdf                                                     72K  
[   ] An Overview of Unix Rootkits.pdf                                                                                 403K  
[   ] An Undetectable Computer Virus.pdf                                                                                33K  
[   ] An epidemiological model of virus spread and cleanup.pdf                                                         150K  
[   ] Analysis and Detection of Computer Viruses and Worms.pdf                                                         652K  
[   ] Analysis and detection of metamorphic computer viruses.pdf                                                       932K  
[   ] Analysis of Virus Algorithms.pdf                                                                                  69K  
[   ] Analysis of Web Application Worms and Viruses.pdf                                                                589K  
[   ] Analysis of a scanning model of worm propagation.pdf                                                             397K  
[   ] Analysis of rxbot.pdf                                                                                            816K  
[   ] Analyzing Worms and Network Traffic using Compression.pdf                                                        196K  
[   ] Anatomy of a Semantic Virus.pdf                                                                                  306K  
[   ] Ani-hilate this week.pdf                                                                                          64K  
[   ] Anomalous Payload-based Network Intrusion Detection.pdf                                                          285K  
[   ] Anomalous Payload-based Worm Detection and Signature Generation.pdf                                              279K  
[   ] Anonymous and Malicious.pdf                                                                                      248K  
[   ] Anti-Disassembly using Cryptographic Hash Functions.pdf                                                          162K  
[   ] Anti-Forensics The Rootkit Connection.pdf                                                                        596K  
[   ] Anti-Malware Tools Intrusion Detection Systems.pdf                                                               893K  
[   ] Anti-Spyware Coalition Definitions and Supporting Documents.pdf                                                  274K  
[   ] Anti-Virus Product Evaluation in the Real World.pdf                                                               57K  
[   ] Anti-Virus in the Corporate Arena.pdf                                                                             90K  
[   ] Antivirus Software Testing for the New Millenium.pdf                                                              53K  
[   ] Antivirus update reaction times of major antivirus vendors.pdf                                                   232K  
[   ] Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware.pdf               111K  
[   ] Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection.pdf          377K  
[   ] Applications of Genetic Algorithms to Malware Detection and Creation.pdf                                         144K  
[   ] Applications of Immune System Computing.pdf                                                                      606K  
[   ] Applied parallel coordinates for logs and network traffic attack analysis.pdf                                    2.9M  
[   ] Approaches to Integrated Malware Detection and Avoidance.pdf                                                      62K  
[   ] Approaching Zero - The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals.pdf 2.0M  
[   ] Architecture of a Morphological Malware Detector.pdf                                                             787K  
[   ] Are Computer Hacker Break-ins Ethical.pdf                                                                         44K  
[   ] Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection.pdf                                   90K  
[   ] Are Handheld Viruses a Significant Threat.pdf                                                                    117K  
[   ] Are Metamorphic Viruses Really Invincible.pdf                                                                    343K  
[   ] Are computer viruses spread by the media.pdf                                                                     3.9K  
[   ] Are current antivirus programs able to detect complex metamorphic malware An empirical evaluation.pdf            941K  
[   ] Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited.pdf             229K  
[   ] Artificial Immune System against Viral Attack.pdf                                                                342K  
[   ] Artificial Immune Systems and the Grand Challenge for Non-Classical Computation.pdf                              213K  
[   ] As Japanese Bring Work Home, Virus Hitches a Ride.pdf                                                            202K  
[   ] Attack of the Clones.pdf                                                                                          39K  
[   ] Attack of the killer virus!.pdf                                                                                   79K  
[   ] Attack of the quantum worms.pdf                                                                                  410K  
[   ] Attacking Antivirus.pdf                                                                                          260K  
[   ] Attitude Adjustment Trojans and Malware on the Internet.pdf                                                      207K  
[   ] Auto-Sign an automatic signature generator for high-speed malware filtering devices.pdf                          586K  
[   ] Autoimmune computer virus.pdf                                                                                    187K  
[   ] Automated Classification and Analysis of Internet Malware.pdf                                                    489K  
[   ] Automated Defense from Rootkit Attacks.pdf                                                                       193K  
[   ] Automated Malware Invariant Generation.pdf                                                                       176K  
[   ] Automated Web Patrol with Strider HoneyMonkeys Finding Web Sites That Exploit Browser Vulnerabilities.pdf        618K  
[   ] Automated Worm Fingerprinting.pdf                                                                                547K  
[   ] Automatic Comparison of Malware.pdf                                                                              1.1M  
[   ] Automatic Extraction of Computer Virus Signatures.pdf                                                            622K  
[   ] Automatic Reverse Engineering of Malware Emulators.pdf                                                           1.4M  
[   ] Automatic Static Unpacking of Malware Binaries.pdf                                                               142K  
[   ] Automatic binary deobfuscation.pdf                                                                               1.8M  
[   ] Automatically Generating Signatures for Polymorphic Worms.pdf                                                    171K  
[   ] Avoiding Windows Rootkit Detection.pdf                                                                           106K  
[   ] BIRD Binary Interpretation using Runtime Disassembly.pdf                                                         109K  
[   ] Backdoors_et_rootkits_avancees.pdf                                                                               248K  
[   ] Backdoors_et_rootkits_avancees_[SLIDES].pdf                                                                      302K  
[   ] Bad Transfer.pdf                                                                                                  44K  
[   ] Becoming Positive.pdf                                                                                             74K  
[   ] Benefits and Considerations for a Single-Vendor Antivirus Strategy.pdf                                           123K  
[   ] Beyond Layers and Peripheral Antivirus Security.pdf                                                              213K  
[   ] Binary Obfuscation Using Signals.pdf                                                                             175K  
[   ] Biological Aspects of Computer Virology.pdf                                                                      135K  
[   ] Biological Models of Security for Virus Propagation in Computer Networks.pdf                                      65K  
[   ] Biological versus Computer Viruses.pdf                                                                           912K  
[   ] Biologically Inspired Defenses Against Computer Viruses.pdf                                                      234K  
[   ] Blast off!.pdf                                                                                                    30K  
[   ] Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses.pdf                 1.4M  
[   ] Blueprint for a Computer Immune System.pdf                                                                       133K  
[   ] Bot Software Spreads, Causes New Worries.pdf                                                                     178K  
[   ] Botnetsand Applications.pdf                                                                                      679K  
[   ] Broadband Network Virus Detection System Based on Bypass Monitor.pdf                                             183K  
[   ] CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD VIRUSES AND COMPUTERS.pdf                                        251K  
[   ] COMPUTE!'s computer viruses.pdf                                                                                  4.6M  
[   ] COMPUTER VIRUS FUTURE CYBER WEAPONS.pdf                                                                           28K  
[   ] COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT TECHNOLOGY.pdf                                                     56K  
[   ] COMPUTER VIRUSES AND CIVIL LIABILITY A CONCEPTUAL FRAMEWORK.pdf                                                  248K  
[   ] COMPUTER VIRUSES PREVENTION, DETECTION, AND TREATMENT.pdf                                                         50K  
[   ] Cabirn fever.pdf                                                                                                  37K  
[   ] Cain and Abul.pdf                                                                                                 41K  
[   ] Callgraph properties of executables.pdf                                                                          1.1M  
[   ] Can cryptography prevent computer viruses.pdf                                                                     77K  
[   ] Can you be held civilly liable for spreading computer viruses.pdf                                                1.0M  
[   ] Can you spare a seg.pdf                                                                                           44K  
[   ] Catch Me If You Can.pdf                                                                                          891K  
[   ] Catch Me, If You Can Evading Network Signatures with Web-based Polymorphic Worms.pdf                             106K  
[   ] Challenges Of Modeling BotNets For Military And Security Simulations.pdf                                         354K  
[   ] Challenges in getting 'formal' with viruses.pdf                                                                   34K  
[   ] Chamber of horrors.pdf                                                                                            41K  
[   ] Characterization of virus replication.pdf                                                                        599K  
[   ] Cheating the ELF Subversive Dynamic Linking to Libraries.pdf                                                     240K  
[   ] Chiba witty blues.pdf                                                                                             27K  
[   ] Classification and identification of malicious code based on heuristic techniques utilizing Meta languages.pdf   2.0M  
[   ] Classification of Computer Viruses Using the Theory of Affordances.pdf                                           226K  
[   ] Classification of Packed Executables for Accurate Computer Virus Detection.pdf                                   195K  
[   ] Cobra Fine-grained Malware Analysis using Stealth Localized-executions.pdf                                       649K  
[   ] Code Red Worm Propagation Modeling and Analysis.pdf                                                              173K  
[   ] Code mutation techniques by means of formal grammars and automatons.pdf                                          729K  
[   ] Code obfuscation and virus detection.pdf                                                                         930K  
[   ] Code obfuscation techniques for metamorphic viruses.pdf                                                          761K  
[   ] Code-Red a case study on the spread and victims of an Internet worm.pdf                                          328K  
[   ] Collaborative Defense Against Zero-Day and Polymorphic Worms Detection, Response and an Evaluation Framework.pdf 769K  
[   ] Combating computer viruses.pdf                                                                                   246K  
[   ] Combinatorial Optimisation of Worm Propagation on an Unknown Network.pdf                                         466K  
[   ] Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'.pdf                                   57K  
[   ] Comparative analysis of various ransomware virii.pdf                                                             1.7M  
[   ] Comparing Passive and Active Worm Defenses.pdf                                                                   252K  
[   ] Computational Aspects of Computer Viruses.pdf                                                                    1.4M  
[   ] Computer Immunology(Lau).pdf                                                                                     327K  
[   ] Computer Immunology.pdf                                                                                          450K  
[   ] Computer Insecurity and Viral AttacksLiability Issues Regarding Unsafe Computer Systems Under Quebec Law.pdf     224K  
[   ] Computer Malware What You Don't Know Can Hurt You.pdf                                                            157K  
[   ] Computer Parasitology.pdf                                                                                         97K  
[   ] Computer Security Analysis through Decompilation and High-Level Debugging.pdf                                     79K  
[   ] Computer Virus Identification and Prevention.pdf                                                                  44K  
[   ] Computer Virus Myths.pdf                                                                                         347K  
[   ] Computer Virus Operation and New Directions-1997.pdf                                                             820K  
[   ] Computer Virus Operation and New Directions.pdf                                                                  583K  
[   ] Computer Virus Propagation Model Based on Variable Propagation Rate.pdf                                          727K  
[   ] Computer Virus Propagation Models.pdf                                                                            291K  
[   ] Computer Virus Strategies and Detection Methods.pdf                                                               77K  
[   ] Computer Virus Survival Guide.pdf                                                                                 25M  
[   ] Computer Virus-Antivirus Coevolution.pdf                                                                         310K  
[   ] Computer Virus__.pdf                                                                                              16K  
[   ] Computer Viruses - A Form of Artificial Life.pdf                                                                 218K  
[   ] Computer Viruses - Legal Options.pdf                                                                             233K  
[   ] Computer Viruses - Theory and Experiments.pdf                                                                    1.3M  
[   ] Computer Viruses A Global Perspective.pdf                                                                        234K  
[   ] Computer Viruses A Management Perspective.pdf                                                                     24K  
[   ] Computer Viruses A Very Real Threat.pdf                                                                          152K  
[   ] Computer Viruses Are Nothing New Don't be ashamed.pdf                                                             10K  
[   ] Computer Viruses By Ingrid Richter.pdf                                                                           399K  
[   ] Computer Viruses Can It Happen At IU.pdf                                                                         231K  
[   ] Computer Viruses Episode.pdf                                                                                     101K  
[   ] Computer Viruses The Disease, the Detection, and the Prescription for Protection Testimony.pdf                   191K  
[   ] Computer Viruses The Technology and Evolution of an Artificial Life Form.pdf                                     630K  
[   ] Computer Viruses The Threat Today and The Expected Future.pdf                                                    269K  
[   ] Computer Viruses and Ethics.pdf                                                                                  1.0M  
[   ] Computer Viruses and Malware.pdf                                                                                  11M  
[   ] Computer Viruses and Other Malicious Software A Threat to the Internet Economy.pdf                               3.7M  
[   ] Computer Viruses and Related Threats.pdf                                                                          31K  
[   ] Computer Viruses and Their Control.pdf                                                                            19K  
[   ] Computer Viruses and What to Do About Them.pdf                                                                    97K  
[   ] Computer Viruses and the Simulation Environment WiCE.pdf                                                         3.6M  
[   ] Computer Viruses as Artificial Life.pdf                                                                          133K  
[   ] Computer Viruses as a Threat to Home Users.pdf                                                                    76K  
[   ] Computer Viruses for Dummies.pdf                                                                                 2.6M  
[   ] Computer Viruses on the Loose.pdf                                                                                349K  
[   ] Computer Viruses the Inevitability of Evolution.pdf                                                              451K  
[   ] Computer Viruses, Artificial Life and Evolution.pdf                                                              3.8M  
[   ] Computer Viruses, Epidemiology and Worms.pdf                                                                     440K  
[   ] Computer Viruses, Epidemiology, and Worms.pdf                                                                    595K  
[   ] Computer Worms Past, Present, and Future.pdf                                                                     136K  
[   ] Computer abuse vandalizing the information society.pdf                                                            36K  
[   ] Computer doctor busy fighting `viruses'.pdf                                                                      126K  
[   ] Computer intrusions and attacks.pdf                                                                               57K  
[   ] Computer virus cover withdrawn.pdf                                                                                90K  
[   ] Computer virus identification by neural networks.pdf                                                             716K  
[   ] Computer virus immunization.pdf                                                                                  4.5M  
[   ] Computer virus prevention and containment on mainframes.pdf                                                      763K  
[   ] Computer virus prevention primer.pdf                                                                              93K  
[   ] Computer viruses (BMJ 296-013).pdf                                                                               2.3M  
[   ] Computer viruses (BMJ 299-66a).pdf                                                                               344K  
[   ] Computer viruses (BMJ 302-66e).pdf                                                                               302K  
[   ] Computer viruses (BMJ 307-59e).pdf                                                                               664K  
[   ] Computer viruses - a high-tech disease.pdf                                                                        85M  
[   ] Computer viruses - the current state in Italy.pdf                                                                225K  
[   ] Computer viruses a quantitative analysis.pdf                                                                     372K  
[   ] Computer viruses and anti-virus warfare.pdf                                                                       91M  
[   ] Computer viruses and electronic mail.pdf                                                                         204K  
[   ] Computer viruses demystified,2.pdf                                                                               144K  
[   ] Computer viruses demystified.pdf                                                                                 1.0M  
[   ] Computer viruses from theory to applications.pdf                                                                 1.9M  
[   ] Computer-Generated Life.pdf                                                                                       74K  
[   ] Computers and epidemiology.pdf                                                                                   142K  
[   ] Computers under attacks!.pdf                                                                                      85K  
[   ] Concepts and Future Trends in Computer Virology.pdf                                                              841K  
[   ] Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf                                             225K  
[   ] Concepts of cooperation in artificial life.pdf                                                                   353K  
[   ] Conceptual Frameworks for Artificial Immune Systems.pdf                                                          284K  
[   ] Conflict and the Computer Information Warfare and Related Ethical Issues.pdf                                     248K  
[   ] Consensual Realities in Cyberspace.pdf                                                                           242K  
[   ] Console viruses.pdf                                                                                              119K  
[   ] Constructing Computer Virus Phylogenies.pdf                                                                      190K  
[   ] Constructing Malware Normalizers using Term Rewriting.pdf                                                        219K  
[   ] Contagion and Repetition On the Viral Logic of Network Culture.pdf                                               173K  
[   ] Contagion on the Internet.pdf                                                                                    118K  
[   ] Contournement dune passerelle antivirus.pdf                                                                      122K  
[   ] Control Flow Graphs as Malware Signatures.pdf                                                                    158K  
[   ] Control Flow to Detect Malware.pdf                                                                               345K  
[   ] Controlling Super-Intelligent Machines.pdf                                                                        18K  
[   ] Convergence of Virus Writers and Hackers Fact or Fantasy.pdf                                                     255K  
[   ] Cooperative Automated worm Response and Detection ImmuNe ALgorithm.pdf                                           143K  
[   ] Corporate Virus Protection.pdf                                                                                    20K  
[   ] Countering Kernel Rootkits with Lightweight Hook Protection.pdf                                                  188K  
[   ] Countering Network Worms Through Automatic Patch Generation.pdf                                                  281K  
[   ] Countering NetworkWorms Through Automatic Patch Generation.pdf                                                   150K  
[   ] Covert Distributed Processing with Computer Viruses.pdf                                                          179K  
[   ] Creating a Secure Computer Virus Laboratory.pdf                                                                   54K  
[   ] Crimea river.pdf                                                                                                  44K  
[   ] Crisis and Aftermath.pdf                                                                                         1.1M  
[   ] Criss-cross.pdf                                                                                                   44K  
[   ] Cryptographic Hashing for Virus Localization.pdf                                                                 154K  
[   ] Cryptography all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf                   4.7M  
[   ] Cryptography and Viruses.pdf                                                                                      96K  
[   ] Cryptovirology Extortion-Based Security Threats and Countermeasures.pdf                                          1.1M  
[   ] DCA for Bot Detection.pdf                                                                                        173K  
[   ] Danger theory and collaborative filtering in MANETs.pdf                                                          372K  
[   ] Danger! Deadly new computer viruses want to kill your PC.pdf                                                     131K  
[   ] Darwin inside the machines Malware evolution and the consequences for computer security.pdf                      1.4M  
[   ] Darwin, a Game of Survival of the Fittest among Programs.pdf                                                      26K  
[   ] Darwin.pdf                                                                                                       216K  
[   ] Data Mining Methods for Detection of New Malicious Executables.pdf                                               158K  
[   ] Data security from malicious attack Computer Virus.pdf                                                           106K  
[   ] Database Rootkits.pdf                                                                                            721K  
[   ] Deelaed learning.pdf                                                                                              47K  
[   ] Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf                             357K  
[   ] Defeating Polymorphism Beyond Emulation.pdf                                                                      459K  
[   ] Defending Against Internet Worms A Signature-Based Approach.pdf                                                  156K  
[   ] Defending against Hitlist Worms using Network Address Space Randomization.pdf                                    163K  
[   ] Defending against Viruses and Worms.pdf                                                                          1.2M  
[   ] Defense Against the Dark Arts.pdf                                                                                101K  
[   ] Defense and Detection Strategies against Internet Worms.pdf                                                      2.9M  
[   ] Defense-In-Depth Against Computer Viruses.pdf                                                                    141K  
[   ] Des IDS Detection par lanalyse statistique.pdf                                                                   295K  
[   ] Design of a System for Real-Time Worm Detection.pdf                                                              243K  
[   ] Design of a neural network for recognition and classification of computer viruses.pdf                            1.2M  
[   ] Design of an Artificial Immune System as a Novel Anomaly Detector.pdf                                             69K  
[   ] Detecting Early Worm Propagation through Packet Matching.pdf                                                     164K  
[   ] Detecting Internet Worms Using Data Mining Techniques.pdf                                                        136K  
[   ] Detecting Kernel-Level Rootkits Through Binary Analysis.pdf                                                      788K  
[   ] Detecting Malicious Code by Model Checking.pdf                                                                   700K  
[   ] Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf                           833K  
[   ] Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf                               248K  
[   ] Detecting Metamorphic Computer Viruses using Supercompilation.pdf                                                211K  
[   ] Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf           574K  
[   ] Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf                                   318K  
[   ] Detecting Sources of Computer Viruses in Networks Theory and Experiment.pdf                                      1.1M  
[   ] Detecting Stealth Software with Strider GhostBuster.pdf                                                          324K  
[   ] Detecting Unknown Computer Viruses.pdf                                                                           1.3M  
[   ] Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf                                            251K  
[   ] Detecting Viral Propagations Using Email Behavior Profiles.pdf                                                   1.3M  
[   ] Detecting Virus Mutations Via Dynamic Matching.pdf                                                               298K  
[   ] Detecting Windows Server Compromises with Patchfinder 2.pdf                                                      187K  
[   ] Detecting Worms through Cryptographic Hashes.pdf                                                                 308K  
[   ] Detecting Worms via Mining Dynamic Program Execution.pdf                                                         231K  
[   ] Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf                                     1.5M  
[   ] Detecting metamorphic viruses using profile hidden markov models.pdf                                             548K  
[   ] Detecting self-mutating malware using control-flow graph matching.pdf                                             98K  
[   ] Detecting worms through de-centralized monitoring.pdf                                                            203K  
[   ] Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf                                  230K  
[   ] Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf                      222K  
[   ] Detection of Metamorphic and Virtualization-based malware using Algebraic Specification-2.pdf                    147K  
[   ] Detection of New Malicious Code Using N-grams Signatures.pdf                                                     359K  
[   ] Detection of Self-Mutating Computer Viruses.pdf                                                                  114K  
[   ] Detection of metamorphic computer viruses using algebraic specification.pdf                                      211K  
[   ] Developing a Trojan applets in a smart card.pdf                                                                  640K  
[   ] Development of Computer Vulnerability Scanning Scanning Workgroup.pdf                                            270K  
[   ] Development of inland lakes as hubs in an invasion network.pdf                                                   972K  
[   ] Die Gefahr Von Debug Codes.pdf                                                                                   169K  
[   ] Digital Postmark Helps Fight Spam, Virus Attacks.pdf                                                             151K  
[   ] Directed-Graph Epidemiological Models of Computer Viruses.pdf                                                    1.6M  
[   ] Disk-Level Behavioral Malware Detection.pdf                                                                      1.1M  
[   ] Disk-Level Behavioral Virus Detection.pdf                                                                        5.5M  
[   ] Distributed Computing with a Trojan Horse.pdf                                                                    590K  
[   ] Distributed Worm Simulation with a Realistic Internet Model.pdf                                                  593K  
[   ] Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf                     889K  
[   ] Do The Media Spread Computer Viruses.pdf                                                                          18K  
[   ] Do the macarena.pdf                                                                                               58K  
[   ] Do-It-Yourself Guide to Cell Phone Malware.pdf                                                                   188K  
[   ] Doin' the eagle rock.pdf                                                                                          45K  
[   ] Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf                                           343K  
[   ] Dynamic analysis of malicious code.pdf                                                                           212K  
[   ] Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf                     3.8M  
[   ] Dynamical Models for Computer Viruses Propagation.pdf                                                            3.8M  
[   ] E-mail virus protection handbook.pdf                                                                             492K  
[   ] ELF et virologie informatique.pdf                                                                                257K  
[   ] EPOCalypse NOW!.pdf                                                                                              456K  
[   ] Effective and Inexpensive Methods Exist for Controlling Software Viruses.pdf                                     198K  
[   ] Effectiveness of Quarantine in Worm Epidemics.pdf                                                                355K  
[   ] Effectiveness of Rate Control in Slowing Down Worm Epidemics.pdf                                                 259K  
[   ] Efficiency of Trusted Platform Module Against Computer Attacks.pdf                                               157K  
[   ] Efficient Content-Based Detection of Zero-Day Worms.pdf                                                           98K  
[   ] Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf                                   536K  
[   ] Efficient Virus Detection Using Dynamic Instruction Sequences.pdf                                                438K  
[   ] Efficient quarantining of scanning worms optimal detection and coordination.pdf                                  173K  
[   ] Email Virus Propagation Modeling and Analysis.pdf                                                                359K  
[   ] Email networks and the spread of computer viruses.pdf                                                            264K  
[   ] End-to-end security implementation for mobile devices using TLS protocol.pdf                                     568K  
[   ] Epidemic Profiles and Defense of Scale-Free Networks.pdf                                                         161K  
[   ] Epidemic Spreading in Real Networks An Eigenvalue Viewpoint.pdf                                                  279K  
[   ] Epidemic dynamics and endemic states in complex networks.pdf                                                     279K  
[   ] Epidemics and immunization in scale-free networks.pdf                                                            221K  
[   ] Epidemiological Modelling of Peer-to-Peer Viruses and Pollution.pdf                                              828K  
[   ] Epidemiological Models Applied to Viruses in Computer Networks.pdf                                               106K  
[   ] Equational reasoning obfuscated decipher routine.pdf                                                              99K  
[   ] Ethereal analyseur multiples.pdf                                                                                 499K  
[   ] Ethical Issues in Computer Virus Distribution.pdf                                                                103K  
[   ] Evaluation of Two Host-Based Intrusion Prevention Systems.pdf                                                    171K  
[   ] Evaluation of malware phylogeny modelling systems using automated variant generation.pdf                         309K  
[   ] Evolution, Ecology and Optimization of Digital Organisms.pdf                                                     179K  
[   ] Evolvable Malware.pdf                                                                                            567K  
[   ] Examing Viruses.pdf                                                                                              1.1M  
[   ] Execution Context in Anti-Malware Testing.pdf                                                                    156K  
[   ] Experience with Viruses on UNIX Systems.pdf                                                                      1.5M  
[   ] Exploiting an Antivirus Interface.pdf                                                                            187K  
[   ] Extended recursion-based formalization of virus mutation.pdf                                                     259K  
[   ] FPGA Viruses.pdf                                                                                                 166K  
[   ] Fast Detection of Scanning Worm Infections.pdf                                                                   247K  
[   ] Fast virus detection by using high speed time delay neural networks.pdf                                          579K  
[   ] Faster parameter detection of polymorphic viral binary code using hot list strategy.pdf                           95K  
[   ] Feedback Email Worm Defense System for Enterprise Networks.pdf                                                   143K  
[   ] Fighting Computer Viruses.pdf                                                                                    129K  
[   ] Fighting EPO Viruses.pdf                                                                                         369K  
[   ] File system driver filtering against metamorphic viral coding.pdf                                                 91K  
[   ] Fileprint analysis for Malware Detection.pdf                                                                     850K  
[   ] Finding Malware on Compromised Windows Machines.pdf                                                              102K  
[   ] First Virus.pdf                                                                                                  436K  
[   ] Flexible Infections Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism.pdf                    91K  
[   ] Flibi Evolution.pdf                                                                                               93K  
[   ] Flibi night.pdf                                                                                                   41K  
[   ] Flying below the Radar What modern malware tells us.pdf                                                          2.4M  
[   ] Flying solo.pdf                                                                                                   55K  
[   ] Formal Affordance-based Models of Computer Virus Reproduction.pdf                                                322K  
[   ] Formal Definition of Self-reproductive Systems.pdf                                                                74K  
[   ] Formal Models of Reproduction from Computer Viruses to Artificial Life.pdf                                       3.1M  
[   ] Formalisation and implementation aspects of K -ary (malicious) codes.pdf                                         380K  
[   ] Formalization of viruses and malware through process algebras.pdf                                                220K  
[   ] Fragmented malware through RFID and its defenses.pdf                                                             816K  
[   ] Frankie say relax.pdf                                                                                             42K  
[   ] Free Anti-Virus Tips and Techniques.pdf                                                                          940K  
[   ] From AntiVirus to AntiMalware Software and Beyond.pdf                                                             90K  
[   ] Functional polymorphic engines formalisation, implementation and use cases.pdf                                   1.0M  
[   ] Functional similarities between computer worms and biological pathogens.pdf                                      215K  
[   ] Future Trends in Malicious Code - 2006 Report.pdf                                                                 87K  
[   ] GETTING THE WORD OUT.pdf                                                                                         5.6K  
[   ] Gatt got your tongue.pdf                                                                                          56K  
[   ] Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior.pdf                             257K  
[   ] Generic Detection and Classification of Polymorphic Malware Using Neural Pattern Recognition.pdf                 318K  
[   ] Generic Virus Scanner in C++.pdf                                                                                  90K  
[   ] Generic metamorphic engine to a black-box classification of antivirus detection techniques.pdf                   570K  
[   ] Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures.pdf        131K  
[   ] Geometry-based flash worm detection.pdf                                                                          567K  
[   ] Good Worms and Human Rights.pdf                                                                                   45K  
[   ] Got [Mac]root.pdf                                                                                                 41K  
[   ] HIPAA and Information Security Policies.pdf                                                                       38K  
[   ] Halting viruses in scale-free networks.pdf                                                                        54K  
[   ] Harmless and Useful Viruses Can Hardly Exist.pdf                                                                 150K  
[   ] Hash-AV Fast Virus Signature Scanning by Cache-Resident Filters.pdf                                              142K  
[   ] Heads or tails.pdf                                                                                                36K  
[   ] Hidan and dangerous.pdf                                                                                           47K  
[   ] Hidden Rootkits in Windows.pdf                                                                                   397K  
[   ] Hide'n'Seek Anatomy of Stealth Malware.pdf                                                                       248K  
[   ] High-Fidelity Modeling of Computer Network Worms.pdf                                                             401K  
[   ] High-Performance Context-Free Parser for Polymorphic Malware Detection.pdf                                       177K  
[   ] History of Viruses & Worms.pdf                                                                                   229K  
[   ] HoneyStat Local Worm Detection Using Honeypots.pdf                                                               266K  
[   ] Honeypots against Worms 101.pdf                                                                                  809K  
[   ] Host-Based Detection of Worms through Peer-to-Peer Cooperation.pdf                                               352K  
[   ] How To Withstand Mobile Virus Attacks.pdf                                                                        217K  
[   ] How Viruses Spread among Computers and People.pdf                                                                452K  
[   ] How dumaru.pdf                                                                                                   449K  
[   ] How the virus Remote Shell Trojan(RST) works.pdf                                                                  21K  
[   ] How to Kill Worms and Viruses with Policy Pontifications.pdf                                                     253K  
[   ] How to assess the effectiveness of your anti-virus.pdf                                                           175K  
[   ] Hunting For Metamorphic.pdf                                                                                      902K  
[   ] Hunting Obfuscated Malwares by Abstract Interpretation.pdf                                                        48K  
[   ] Hunting for Metamorphic Engines.pdf                                                                              1.0M  
[   ] Hunting for undetectable metamorphic viruses.pdf                                                                 1.2M  
[   ] I love you.pdf                                                                                                    56K  
[   ] I've named my virus - now what do I win.pdf                                                                       65K  
[   ] I.T. IN PRACTICE Computer viruses.pdf                                                                            4.3M  
[   ] IDS alerts correlation using grammar-based approach.pdf                                                          640K  
[   ] IMAD In-Execution Malware Analysis and Detection.pdf                                                             751K  
[   ] IPA Computer Virus Survey 2000.pdf                                                                               1.4M  
[   ] Identification of file infecting viruses through detection of self-reference replication.pdf                     1.2M  
[   ] Identifying Malicious Code Through Reverse Engineering.pdf                                                       6.2M  
[   ] Identifying Metamorphic Malware.pdf                                                                              163K  
[   ] Immune System for Virus Detection and Elimination.pdf                                                            740K  
[   ] Immunity-Based Intrusion Detection System A General Framework.pdf                                                 83K  
[   ] Immunization and epidemic dynamics in complex networks.pdf                                                       253K  
[   ] Impact of Computer Viruses on Society.pdf                                                                        333K  
[   ] Impeding Malware Analysis Using Conditional Code Obfuscation.pdf                                                 1.6M  
[   ] Impeding worm epidemics through destination address filtering.pdf                                                 62K  
[   ] Implementation of a Computer Immune System for Intrusion- and Virus Detection.pdf                                1.0M  
[   ] Implementing Anti-Virus Controls in the Corporate Arena.pdf                                                       49K  
[   ] Implementing and Detecting an ACPI BIOS Rootkit.pdf                                                              373K  
[   ] Implementing and testing a virus throttle.pdf                                                                    137K  
[   ] Implications of Peer-to-Peer Networks on Worm Attacks and Defenses.pdf                                           558K  
[   ] Implicatoes da ofuscatao de codigo no desenvolvimento de detectores de codigo malicioso.pdf                      282K  
[   ] Imposing Order on Program Statements to Assist Anti-Virus Scanners.pdf                                           304K  
[   ] Improving Malware Detection by Applying Multi-Inducer Ensemble.pdf                                               442K  
[   ] In-depth analysis of the viral threats with OpenOf#ce.org documents.pdf                                          2.6M  
[   ] Incorporating E-Commerce, Internet and Telecommunications Security.pdf                                            51K  
[   ] Infection dynamics on scale-free networks.pdf                                                                     57K  
[   ] Infection dynamics on the Internet.pdf                                                                           154K  
[   ] Infection, imitation and a hierarchy of computer viruses.pdf                                                     162K  
[   ] Information Assurance and the Information Society.pdf                                                             69K  
[   ] Information warfare and security.pdf                                                                              77K  
[   ] Inoculating SSH Against Address-Harvesting Worms.pdf                                                             380K  
[   ] Inoculation strategies for victims of viruses and the sum-of-squares partition problem.pdf                       195K  
[   ] Inside the Slammer Worm.pdf                                                                                      415K  
[   ] Internet - Virusnet.pdf                                                                                          569K  
[   ] Internet Instability and Disturbance Goal or Menace.pdf                                                          1.9M  
[   ] Internet Quarantine Requirements for Containing Self-Propagating Code.pdf                                        153K  
[   ] Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware.pdf                                    568K  
[   ] Internet computer virus protection policy.pdf                                                                    136K  
[   ] Introducing Stealth Malware Taxonomy.pdf                                                                         344K  
[   ] Introduction to Network Self-defense technical and judicial issues.pdf                                           222K  
[   ] Intrusion Detection for Viruses and Worms.pdf                                                                     92K  
[   ] IpMorph fingerprinting spoofing unification.pdf                                                                  1.2M  
[   ] Iranian Journal Examines Electronic Warfare.pdf                                                                   12K  
[   ] Is Your Cat Infected with a Computer Virus.pdf                                                                   194K  
[   ] Is creating virus software protected as a first amendment right.pdf                                               12K  
[   ] Is virus writing really that bad.pdf                                                                             445K  
[   ] It's a bird, it's a plane, it's Fooperman.pdf                                                                     50K  
[   ] It's zell(d)ome the one you expect.pdf                                                                            30K  
[   ] JAB, une backdoor pour reseau Win32 inconnu - Presentation SSTIC.pdf                                             255K  
[   ] JAB, une backdoor pour reseau Win32 inconnu.pdf                                                                   75K  
[   ] Know Your Enemy Containing Conficker.pdf                                                                         700K  
[   ] Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems.pdf           446K  
[   ] La_mobilite_du_code_malveillant.pdf                                                                              233K  
[   ] Language, a virus.pdf                                                                                             44K  
[   ] Le malware en 2005 Unix, Linux et autres plates-formes.pdf                                                        86K  
[   ] Leaps and Bounds.pdf                                                                                              51K  
[   ] Learning to Detect Malicious Executables in the Wild.pdf                                                         211K  
[   ] Learning to Detect and Classify Malicious Executables in the Wild.pdf                                            202K  
[   ] Legal Options To Computer Viruses.pdf                                                                            242K  
[   ] Les_virus_informatiques_Theorie_pratique_et_applications.pdf                                                      20M  
[   ] Let free(dom) Ring!.pdf                                                                                           76K  
[   ] Let them eat brioche.pdf                                                                                          23K  
[   ] Limits of Static Analysis for Malware Detection.pdf                                                              185K  
[   ] Linux Improvised Userland Scheduler Virus.pdf                                                                    112K  
[   ] Loathing Lupper in Linux.pdf                                                                                     389K  
[   ] Look at that escargot.pdf                                                                                         38K  
[   ] Looking a Bagift-Horse in the Mouth.pdf                                                                           43K  
[   ] MALWARE ANALYSIS.pdf                                                                                              59K  
[   ] MCF a malicious code filter.pdf                                                                                  2.2M  
[   ] MRSI A Fast Pattern Matching Algorithm for Anti-virus Applications.pdf                                           293K  
[   ] Macro virus identification problems.pdf                                                                          2.1M  
[   ] Magisterium Abraxas.pdf                                                                                          152K  
[   ] Making a hash of things.pdf                                                                                       39K  
[   ] Malicious Codes in Depth.pdf                                                                                     298K  
[   ] Malicious Cryptography - Exposing Cryptovirology.pdf                                                              29M  
[   ] Malicious Cryptography Cryptovirology and Kleptography.pdf                                                        42K  
[   ] Malicious Cryptography Kleptographic Aspects.pdf                                                                 168K  
[   ] Malicious Data and Computer Security.pdf                                                                          64K  
[   ] Malicious Software in Mobile Devices.pdf                                                                         395K  
[   ] Malicious Software.pdf                                                                                           360K  
[   ] Malicious Threats to Personal Digital Assistants.pdf                                                              79K  
[   ] Malicious origami in PDF.pdf                                                                                     1.8M  
[   ] Malware Analyst's Cookbook and DVD.pdf                                                                           8.9M  
[   ] Malware Collection and Incident Response Proposal Discover.pdf                                                   810K  
[   ] Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf                         631K  
[   ] Malware Detection using Statistical Analysis of Byte-Level File Content.pdf                                      304K  
[   ] Malware Detection.pdf                                                                                             18M  
[   ] Malware Forensics Investigating and Analyzing Malicious Code.pdf                                                  25M  
[   ] Malware Normalization.pdf                                                                                        312K  
[   ] Malware Phylogeny Generation using Permutations of Code.pdf                                                      217K  
[   ] Malware Research at SMU.pdf                                                                                      289K  
[   ] Malware Von Viren, Wuermern, Hackern und Trojanern und wie man sich vor ihnen schuetzt.pdf                        22M  
[   ] Malware analysis for windows administrators.pdf                                                                   73K  
[   ] Malware behaviour analysis.pdf                                                                                   899K  
[   ] Malware comes of age The arrival of the true computer parasite.pdf                                               244K  
[   ] Malware in Popular Networks.pdf                                                                                  133K  
[   ] Malware pattern scanning schemes secure against black-box analysis.pdf                                           385K  
[   ] Malware, Viruses and Log Visualisation.pdf                                                                       474K  
[   ] Malware.pdf                                                                                                       47K  
[   ] MalwareA Future Framework for Device, Network and Service Management.pdf                                         275K  
[   ] Managing Computer Viruses in a Groupware Environment.pdf                                                         124K  
[   ] Marginal Networks The Virus between Complexity and Suppression.pdf                                               252K  
[   ] Mathematical Model of Computer Viruses.pdf                                                                        90K  
[   ] Mathematical Viruses.pdf                                                                                         111K  
[   ] Mathematical models on computer viruses.pdf                                                                      353K  
[   ] Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf                                    1.1M  
[   ] Measuring and Modeling Computer Virus Prevalence.pdf                                                             1.2M  
[   ] Measuring virtual machine detection in malware using DSD tracer.pdf                                              764K  
[   ] Mechanics of Self-reproduction.pdf                                                                               1.7M  
[   ] Metamorphic Virus Analysis and Detection.pdf                                                                     1.0M  
[   ] Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf                                                  369K  
[   ] Metaphors And Meta-Experiences In Technology Side Effects A Multimedia Exhibit.pdf                               380K  
[   ] Metaphors and Modern Threats Biological, Computer, and Cognitive Viruses.pdf                                     962K  
[   ] Mimimorphism A New Approach to Binary Code Obfuscation.pdf                                                       387K  
[   ] Mind Wars Attack of the Memes.pdf                                                                                120K  
[   ] Misleading Modern Malware.pdf                                                                                    370K  
[   ] Mobile Code Threats, Fact or Fiction.pdf                                                                          83K  
[   ] Mobile Malware Attacks and Defense.pdf                                                                           6.7M  
[   ] Model for network behaviour under viral attack.pdf                                                               1.1M  
[   ] Model-Based Analysis of Two Fighting Worms.pdf                                                                   320K  
[   ] Model_for_detecting_the_existence_of_software_corruption_in_real_time.pdf                                        218K  
[   ] Modeling Botnet Propagation Using Time Zones.pdf                                                                 528K  
[   ] Modeling Computer Viruses.pdf                                                                                    595K  
[   ] Modeling Epidemic Spreading in Mobile Environments.pdf                                                           573K  
[   ] Modeling Malware Spreading Dynamics.pdf                                                                          790K  
[   ] Modeling Virus Propagation in Peer-to-Peer Networks.pdf                                                          129K  
[   ] Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf         433K  
[   ] Modeling the Effects of Timing Parameters on Virus Propagation.pdf                                               678K  
[   ] Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf                                   2.2M  
[   ] Modeling the Spread of Active Worms.pdf                                                                          632K  
[   ] Modelling Development of Epidemics with Dynamic Small-World Networks.pdf                                         233K  
[   ] Models of Active Worm Defenses.pdf                                                                               210K  
[   ] Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf                                        130K  
[   ] Modern operating systems.pdf                                                                                     425K  
[   ] Modular worms.pdf                                                                                                108K  
[   ] Monitoring and Early Warning for Internet Worms.pdf                                                              195K  
[   ] Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf                             1.3M  
[   ] Morphological Detection of Malware.pdf                                                                           787K  
[   ] Mostly harmless.pdf                                                                                               46K  
[   ] Multi-Stage Delivery of Malware.pdf                                                                              2.0M  
[   ] Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf                    115K  
[   ] N-gram analysis for computer virus detection.pdf                                                                 217K  
[   ] N-gram-based Detection of New Malicious Code.pdf                                                                  84K  
[   ] Nematodes - Beneficial Worms.pdf                                                                                 114K  
[   ] Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf                         448K  
[   ] Network Worms.pdf                                                                                                149K  
[   ] Networks, Control, and Life-Forms.pdf                                                                            174K  
[   ] New data mining technique to enhance IDS alarms quality.pdf                                                      672K  
[   ] New malware distribution methods threaten signature-based AV.pdf                                                 248K  
[   ] New method of fighting computer viruses announced.pdf                                                            115K  
[   ] New thoughts in ring3 NT rootkit.pdf                                                                             260K  
[   ] New threats of Java viruses.pdf                                                                                  183K  
[   ] Next-Generation Viruses Present New Challenges.pdf                                                                83K  
[   ] Nimda Worm Shows You Can't Always Patch Fast Enough.pdf                                                           24K  
[   ] Non-signature based virus detection.pdf                                                                          1.0M  
[   ] Normalizing Metamorphic Malware Using Term Rewriting.pdf                                                         161K  
[   ] Not Teaching Viruses and Worms Is Harmful.pdf                                                                     40K  
[   ] Not worthy.pdf                                                                                                    38K  
[   ] Notes on the Worms programs.pdf                                                                                  1.3M  
[   ] Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf                 31K  
[   ] Old Win32 Code for a Modern Super-stealth Trojan.pdf                                                             352K  
[   ] On Callgraphs and Generative Mechanisms.pdf                                                                      1.8M  
[   ] On Computer Viral Infection and the Effect of Immunization.pdf                                                   180K  
[   ] On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf                  191K  
[   ] On Effectiveness of Defense Systems against Active Worms.pdf                                                     1.2M  
[   ] On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf                                            313K  
[   ] On JavaScript Malware and related threats.pdf                                                                    436K  
[   ] On abstract computer virology from a recursion theoretic perspective.pdf                                         178K  
[   ] On abstract computer virology from a recursion-theoretic perspective.pdf                                         204K  
[   ] On behavioral detection.pdf                                                                                      119K  
[   ] On self-reproducing computer programs.pdf                                                                        6.2M  
[   ] On the Effectiveness of Address-Space Randomization.pdf                                                          147K  
[   ] On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf                               335K  
[   ] On the Performance of Internet Worm Scanning Strategies.pdf                                                      249K  
[   ] On the Semantics of Self-Unpacking Malware Code.pdf                                                              164K  
[   ] On the Spread of Viruses on the Internet.pdf                                                                     218K  
[   ] On the Time Complexity of Computer Viruses.pdf                                                                   206K  
[   ] On the definition and classification of cybercrime.pdf                                                           117K  
[   ] On the functional validity of the worm-killing worm.pdf                                                          116K  
[   ] On the possibility of practically obfuscating programs.pdf                                                       373K  
[   ] On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf                            487K  
[   ] One-hit models for virus inactivation studies.pdf                                                                 92K  
[   ] Opcodes as Predictor for Malware.pdf                                                                             660K  
[   ] Open Problems in Computer Virus Research.pdf                                                                      42K  
[   ] Open problems in computer virology.pdf                                                                           167K  
[   ] Owning Antivirus.pdf                                                                                             145K  
[   ] PC Magazine Fighting Spyware Viruses and Malware.pdf                                                              10M  
[   ] PE-Miner Mining Structural Information to Detect Malicious Executables in Realtime.pdf                           464K  
[   ] PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN P2P NETWORKS.pdf                                                 263K  
[   ] Painting the Internet A Different Kind of Warhol Worm.pdf                                                         84K  
[   ] Pairwise alignment of metamorphic computer viruses.pdf                                                           294K  
[   ] Panic computing The viral metaphor and computer technology.pdf                                                   876K  
[   ] Paradise lost.pdf                                                                                                 56K  
[   ] Parallel analysis of polymorphic viral code using automated deduction system.pdf                                 113K  
[   ] Parallels Between Biological and Computer Epidemics.pdf                                                          260K  
[   ] Password Cracking A Game of Wits.pdf                                                                             477K  
[   ] Peer-to-Peer Botnets Analysis and Detection.pdf                                                                  2.2M  
[   ] Poison Ivy Farmers Virus Collections.pdf                                                                          80K  
[   ] Polymorphic Worm Detection Using Structural Information of Executables.pdf                                       250K  
[   ] Polymorphic and Metamorphic Malware Detection.pdf                                                                1.3M  
[   ] Polymorphic virus detection technology.pdf                                                                       579K  
[   ] Polymorphing Software by Randomizing Data Structure Layout.pdf                                                   324K  
[   ] Possible Vicarious Liability for Computer Users in the USA.pdf                                                    74K  
[   ] Potential Threats to WAP Enabled Devices.pdf                                                                     129K  
[   ] Powerful virus hits computers.pdf                                                                                100K  
[   ] Practical Detection of Metamorphic Computer Viruses.pdf                                                          1.1M  
[   ] Practical overview of a Xen covert channel.pdf                                                                   1.1M  
[   ] Predators Good Will Mobile Codes Combat against Computer Viruses.pdf                                             514K  
[   ] Prepared testimony and statement for the record on computer virus legislation.pdf                                1.5M  
[   ] Prescription Medicine.pdf                                                                                         52K  
[   ] Principles of a Computer Immune System.pdf                                                                        58K  
[   ] Procedures To Reduce The Computer Virus Threat.pdf                                                               1.0M  
[   ] Profile hidden Markov models and metamorphic virus detection.pdf                                                 865K  
[   ] Profiles in cyber courage.pdf                                                                                    331K  
[   ] Prophet and loss.pdf                                                                                              72K  
[   ] Prophylaxis for virus propagation and general computer security policy.pdf                                       617K  
[   ] Prosecuting Computer Virus Authors The Need for an Adequate and Immediate International Solution.pdf             122K  
[   ] Protection of computer systems from computer viruses ethical and practical issues.pdf                             43K  
[   ] Quantitative risk assessment of computer virus attacks on computer networks.pdf                                  961K  
[   ] Quantum Malware.pdf                                                                                              273K  
[   ] Queuing theory based models for studying intrusion evolution and elimination in computer networks.pdf            277K  
[   ] RFID Security Issues in Military Supply Chains.pdf                                                               250K  
[   ] Raised hacklez.pdf                                                                                                50K  
[   ] Real world anti-virus product reviews and evaluations - the current state of affairs.pdf                          59K  
[   ] Real-Time Virus Detection System Using iNetmon Engine.pdf                                                         21K  
[   ] Rebels for the System Virus writers, general intellect, cyberpunk and criminal capitalism.pdf                    202K  
[   ] Recent Worms A Survey and Trends.pdf                                                                             268K  
[   ] Reductions of the general virus detection problem.pdf                                                             57K  
[   ] Reflections on Trusting Trust.pdf                                                                                220K  
[   ] Reliable Identification of Bounded-length Viruses is NP-complete.pdf                                              70K  
[   ] Reply to Comment on  Framework for Modelling Trojans and Computer Virus Infection by E. Makinen.pdf               39K  
[   ] Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen - Thimbleby.pdf    59K  
[   ] Reports of computer viruses on the increase.pdf                                                                   88K  
[   ] Research in Computer Viruses and Worms.pdf                                                                       349K  
[   ] Resolution based metamorphic computer virus detection using redundancy control strategy.pdf                       79K  
[   ] Response to the Proposal for a Virus database.pdf                                                                296K  
[   ] Revealing Packed Malware.pdf                                                                                     153K  
[   ] Reverse Code Engineering An In-Depth Analysis of the Bagle Virus.pdf                                             1.2M  
[   ] Reverse Engineering Malware.pdf                                                                                  351K  
[   ] Rogue Computer Programs.pdf                                                                                      4.3M  
[   ] Rootkit Hunting vs. Compromise Detection.pdf                                                                     340K  
[   ] Rootkits - Detection and prevention.pdf                                                                          930K  
[   ] Rootkits - The new wave of invisible malware is here.pdf                                                          30K  
[   ] Rootkits Analysis and Detection.pdf                                                                              190K  
[   ] Rotalum A Tool for Automatic Reverse Engineering of Malware Emulators.pdf                                        1.5M  
[   ] Routing Worm A Fast, Selective Attack Worm based on IP Address Information.pdf                                   149K  
[   ] Running head REVERSE ENGINEERING MALWARE.pdf                                                                      81K  
[   ] SBMDS an interpretable string based malware detection system using SVM ensemble with bagging.pdf                 533K  
[   ] SPARSE A Hybrid System to Detect Malcode-Bearing Documents.pdf                                                   1.2M  
[   ] Sandbox Technology Inside AV Scanners.pdf                                                                        241K  
[   ] Scalable, Behavior-Based Malware Clustering.pdf                                                                  462K  
[   ] Scary Networks Viruses as Discursive Practice.pdf                                                                145K  
[   ] Securing Instant Messaging.pdf                                                                                   207K  
[   ] Selbstreproduktion bei programmen.pdf                                                                             38M  
[   ] Self- information systems why not.pdf                                                                            120K  
[   ] Self-Nonself Discrimination in a Computer.pdf                                                                    205K  
[   ] Self-Replicating Turing Machines and Computer Viruses.pdf                                                         48K  
[   ] Self-reproducing machines.pdf                                                                                    315K  
[   ] Semantics-Aware Malware Detection.pdf                                                                            231K  
[   ] Seminar Report on Study of Viruses and Worms.pdf                                                                 152K  
[   ] Server-based Virus-protection On UnixLinux.pdf                                                                   684K  
[   ] Shadow Walker - Raising The Bar For Rootkit Detection.pdf                                                        557K  
[   ] Shield -- A First Line Worm Defense.pdf                                                                          362K  
[   ] Shield Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits.pdf                      195K  
[   ] Should We Teach Virus Writing.pdf                                                                                1.1M  
[   ] Signature Generation and Detection of Malware Families.pdf                                                       287K  
[   ] Simulating Bandwidth-Limited Worms, One Graph to Rule Them All.pdf                                                72K  
[   ] Simulating and optimising worm propagation algorithms.pdf                                                        268K  
[   ] Simulating malware with MAlSim.pdf                                                                               1.4M  
[   ] SinFP, unification of active and passive operating system fingerprinting.pdf                                     364K  
[   ] SirCamstantial Evidence.pdf                                                                                      148K  
[   ] Slack Space Sculpting the computer monsters -- virus inspiration.pdf                                             193K  
[   ] Slackspace.pdf                                                                                                    22K  
[   ] Slamdunk.pdf                                                                                                      43K  
[   ] Sleep-Inducing.pdf                                                                                                21K  
[   ] Small treatise about e-manipulation for honest people.pdf                                                        915K  
[   ] SmartSiren Virus Detection and Alert for Smartphones.pdf                                                         509K  
[   ] Sobig, sobigger, sobiggest.pdf                                                                                   447K  
[   ] Software Diversity as a Defense Against Viral Propagation Models and Simulations.pdf                             190K  
[   ] Software Transformations to Improve Malware Detection.pdf                                                        307K  
[   ] Software Vaccine Technique and Its Application in Early Virus Finding and Tracing.pdf                            165K  
[   ] Some Further Theoretical Results about Computer Viruses.pdf                                                      1.6M  
[   ] Some human dimensions of computer virus creation and infection.pdf                                               156K  
[   ] Something smells fishy.pdf                                                                                        39K  
[   ] Source Code Analysis of Worms.pdf                                                                                290K  
[   ] Specification and evaluation of polymorphic shellcode properties using a new temporal logic.pdf                  786K  
[   ] Spyware & Rootkits.pdf                                                                                            71K  
[   ] Spyware A Little Knowledge is a Wonderful Thing.pdf                                                               89K  
[   ] Spyware and Rootkits - The Future Convergence.pdf                                                                 94K  
[   ] Stack Shape Analysis to Detect Obfuscated calls in Binaries.pdf                                                  182K  
[   ] Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf                                                 68K  
[   ] Static Analysis of Executables to Detect Malicious Patterns.pdf                                                  303K  
[   ] Static Detection of Malicious Code in Executable Programs.pdf                                                    792K  
[   ] Static detection and identification of X86 malicious executables A multidisciplinary approach.pdf                688K  
[   ] Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware.pdf                    148K  
[   ] Stay Safe Online Campaign's AntiVirus Presentation.pdf                                                           200K  
[   ] Stochastic Features of Computer Viruses.pdf                                                                       96K  
[   ] Stoned Bootkit.pdf                                                                                               1.2M  
[   ] Striking Similarities.pdf                                                                                         47K  
[   ] Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis the Bradley Virus.pdf                     196K  
[   ] Structuring ethical curricula in the information age.pdf                                                         107K  
[   ] SubVirt Implementing malware with virtual machines.pdf                                                           205K  
[   ] Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection.pdf                           209K  
[   ] Supervisory control of malicious executables.pdf                                                                 463K  
[   ] Superworms and Cryptovirology a Deadly Combination.pdf                                                           153K  
[   ] Suppressing the spread of email malcode using short-term message recall.pdf                                      151K  
[   ] Survey on Malware Detection Methods.pdf                                                                          159K  
[   ] SweetBait Zero-Hour Worm Detection and Containment Using Honeypots.pdf                                           210K  
[   ] System Dynamic Model for Computer Virus Prevalance.pdf                                                           570K  
[   ] System and method for detecting malicious executable code.pdf                                                    163K  
[   ] TAU cure for computer viruses.pdf                                                                                119K  
[   ] THE MALICIOUS LOGIC BATTLE UNDERSTANDING THE ENEMY.pdf                                                            47K  
[   ] TIBS.pdf                                                                                                         516K  
[   ] TTAnalyze A Tool for Analyzing Malware.pdf                                                                       371K  
[   ] Taiwan's first ever political computer virus.pdf                                                                 281K  
[   ] Taking a Lesson from Stealthy Rootkits.pdf                                                                       217K  
[   ] Taking the redpill Artificial Evolution in native x86 systems.pdf                                                370K  
[   ] Taming Lakatos' Monster - Computer Virus Epidemics and Internet Security Policy.pdf                               39K  
[   ] Taxonomy and Effectiveness of Worm Defense Strategies.pdf                                                        488K  
[   ] Techniques_virales_avances.pdf                                                                                    18M  
[   ] Technological Turf Wars A Case Study of the Computer Antivirus Industry.pdf                                      1.7M  
[   ] Technologically Enabled Crime Shifting Paradigms for the Year 2000.pdf                                           1.4M  
[   ] Testing Malware Detectors.pdf                                                                                    339K  
[   ] Testing Time for Antivirus Software.pdf                                                                          1.4M  
[   ] Testing and evaluating virus detectors for handheld devices.pdf                                                  227K  
[   ] Testing the SETIHacker Hypothesis.pdf                                                                            673K  
[   ] The ABC of computer security.pdf                                                                                 105K  
[   ] The Application of Epidemiology to Computer Viruses.pdf                                                          589K  
[   ] The Art of Computer Virus Research and Defense.pdf                                                               9.9M  
[   ] The Art of File Format Fuzzing.pdf                                                                               1.1M  
[   ] The Asexual Virus Computer Viruses in Feminist Discourse.pdf                                                     117K  
[   ] The Basic Building Blocks of Malware.pdf                                                                         267K  
[   ] The Bite of the Computer Virus.pdf                                                                               3.8K  
[   ] The Blaster Worm - The View from 10,000 feet.pdf                                                                 830K  
[   ] The Brains Behind the Operation.pdf                                                                               21K  
[   ] The Bulgarian Computer Virus Factory.pdf                                                                         9.5K  
[   ] The Bulgarian and Soviet Virus Factories.pdf                                                                     213K  
[   ] The Case for Beneficial Computer Viruses and Worms.pdf                                                            43K  
[   ] The Case for Using Layered Defenses to Stop Worms.pdf                                                            174K  
[   ] The Challenge of Being Prepared for Tomorrows MalWare Today.pdf                                                   42K  
[   ] The Code Red Worm.pdf                                                                                            148K  
[   ] The Code of Life A look at emerging Artificial Life.pdf                                                          154K  
[   ] The Computer Virus -- From There to Here.pdf                                                                     211K  
[   ] The Computer Virus Culture.pdf                                                                                    77K  
[   ] The Cornell Commission On Morris and the Worm.pdf                                                                404K  
[   ] The Costly Implications of Consulting in a Virus-Infected Computer Environment.pdf                               458K  
[   ] The Danger Theory and Its Application to Artificial Immune Systems.pdf                                           210K  
[   ] The Dangers of Computer Viruses Implications for 21st Century Educators.pdf                                      9.0M  
[   ] The Design Space of Metamorphic Malware.pdf                                                                      102K  
[   ] The Ecology of Malware.pdf                                                                                       150K  
[   ] The Effect of DNS Delays on Worm Propagation in an IPv6 Internet.pdf                                             175K  
[   ] The Emergence of the Posthuman Consumer and the Fusion of the Virtual and the Real.pdf                           1.0M  
[   ] The Engine of the Underground The Elite-Kiddie Divide.pdf                                                        159K  
[   ] The Evolution of Viruses and Worms.pdf                                                                           133K  
[   ] The Evolution of the Computer Virus.pdf                                                                           62K  
[   ] The Evolving Virus Threat.pdf                                                                                     46K  
[   ] The Father Christmas worm.pdf                                                                                    570K  
[   ] The Future of Bot Worms.pdf                                                                                       61K  
[   ] The Future of Internet Worms.pdf                                                                                 190K  
[   ] The Future of Malware.pdf                                                                                         81K  
[   ] The Giant Black Book of Computer Viruses (2nd ed.).pdf                                                           1.7M  
[   ] The Giant Black Book of Computer Viruses.pdf                                                                     5.7M  
[   ] The Impact of Countermeasure Propagation on the Prevalence of Computer Viruses.pdf                               581K  
[   ] The Impact of Countermeasure Spreading on the Prevalence of Computer Viruses.pdf                                 124K  
[   ] The Internet Motion Sensor A Distributed Blackhole Monitoring System.pdf                                         646K  
[   ] The Internet Worm Incident.pdf                                                                                   100K  
[   ] The Internet Worm Program An Analysis.pdf                                                                        2.3M  
[   ] The Java mobile risk.pdf                                                                                         127K  
[   ] The Latest Malware Threats Against Your PC.pdf                                                                   511K  
[   ] The Legislative Response to the Evolution of Computer Viruses.pdf                                                215K  
[   ] The Little Black Book of Computer Viruses.pdf                                                                    1.4M  
[   ] The More Things Change....pdf                                                                                     73K  
[   ] The Norman Book on Computer Viruses.pdf                                                                          388K  
[   ] The Pathology of Computer Viruses.pdf                                                                            1.4M  
[   ] The Race Against Malicious Software.pdf                                                                           50K  
[   ] The Real Cost of a Virus Outbreak.pdf                                                                             62K  
[   ] The Rise of AutoRunBased Malware.pdf                                                                             1.7M  
[   ] The Risk of Debug Codes in Batch what are debug codes and why they are dangerous.pdf                             184K  
[   ] The Role of Internet Service Providers in Botnet Mitigation An Empirical Analysis Based on Spam Data.pdf         1.2M  
[   ] The SASSER Event History and Implications.pdf                                                                    653K  
[   ] The Shockwave Rider.pdf                                                                                          1.4M  
[   ] The Social Psychology of Computer Viruses and Worms.pdf                                                          148K  
[   ] The Use of Heuristics in Identifying Self-Propagating Malicious Mobile Code.pdf                                  1.8M  
[   ] The Virtual Artaud Computer Virus as Performance Art.pdf                                                         321K  
[   ] The Virus Hunter.pdf                                                                                             111K  
[   ] The Virus Underground.pdf                                                                                         90K  
[   ] The Virus is Worse than the Cure.pdf                                                                             120K  
[   ] The WiT virus A virus built on the ViT ELF virus.pdf                                                             419K  
[   ] The Worm Programs - Early Experience with a Distributed Computation.pdf                                          870K  
[   ] The Worm Programs--Early Experience with a Distributed Intelligence.pdf                                          925K  
[   ] The Zombie Roundup Understanding, Detecting, and Disrupting Botnets.pdf                                          212K  
[   ] The biology of digital organisms.pdf                                                                              42K  
[   ] The cause and effects of computer viruses.pdf                                                                     31K  
[   ] The dynamics of computer virus infection.pdf                                                                     205K  
[   ] The future of virus detection.pdf                                                                                113K  
[   ] The geneology of malware.pdf                                                                                     785K  
[   ] The impact of Microsoft Windows infection vectors on IP network traffic patterns.pdf                             593K  
[   ] The malware naming chaos.pdf                                                                                      59K  
[   ] The metamorphosis of malware writers.pdf                                                                          83K  
[   ] The missing LNK.pdf                                                                                               47K  
[   ] The motivation behind computer viruses.pdf                                                                        97K  
[   ] The road less truvelled.pdf                                                                                       39K  
[   ] The solution in the naming chaos.pdf                                                                             135K  
[   ] The worm that turned A social use of computer viruses.pdf                                                        2.7M  
[   ] The wormpipe strikes back.pdf                                                                                     64K  
[   ] TheV-Files A dictionary of file threats.pdf                                                                      135K  
[   ] There Are No Safe Virus Tests.pdf                                                                                209K  
[   ] There Is No Ideal Virus Scanner.pdf                                                                              183K  
[   ] Those ubiquitous viruses.pdf                                                                                      43K  
[   ] Thoughts about Cross-View based Rootkit Detection.pdf                                                             99K  
[   ] Threats to Digitization Computer Virus.pdf                                                                        89K  
[   ] Throttling Viruses Restricting propagation to defeat malicious mobile code.pdf                                   122K  
[   ] Time machine.pdf                                                                                                  32K  
[   ] Timing Rootkits.pdf                                                                                               60K  
[   ] To catch Efish.pdf                                                                                                60K  
[   ] Tools for Finding and Removing Rootkits.pdf                                                                      418K  
[   ] Toward an abstract computer virology.pdf                                                                         189K  
[   ] Towards Automated Defense from Rootkit Attacks.pdf                                                               164K  
[   ] Towards Stealthy Malware Detection.pdf                                                                           861K  
[   ] Towards Systematic Evaluation of the Evadability of Bot,Botnet Detection Methods.pdf                             314K  
[   ] Towards an undetectable computer virus.pdf                                                                       1.1M  
[   ] Trap E-mail Address for Combating E-mail Viruses.pdf                                                              70K  
[   ] Trapping Viruses.pdf                                                                                              68K  
[   ] Treating scalability and modelling human countermeasures against local preference worms via gradient models.pdf  290K  
[   ] Trends in Viruses and Worms.pdf                                                                                  165K  
[   ] Trends of Spyware, Viruses and Exploits.pdf                                                                       78K  
[   ] Trojan White Paper.pdf                                                                                           1.8M  
[   ] Trojans Worms and Spyware A Computer Security Professional's Guide to Malicious Code.pdf                         1.3M  
[   ] Tumours and polips.pdf                                                                                            67K  
[   ] Turing Machines and Undecidability with Special Focus on Computer Viruses.pdf                                    284K  
[   ] Twinkle, twinkle little star.pdf                                                                                  60K  
[   ] Two Bills Equal Forewarning.pdf                                                                                  323K  
[   ] USC-OIA Special Virus Report.pdf                                                                                 643K  
[   ] Ukrainian-Russian Hackers the Stealth Group and Its Leader, LovinGOD.pdf                                         256K  
[   ] Un combate con el Kerado.pdf                                                                                      41K  
[   ] Understanding Computer Viruses.pdf                                                                               779K  
[   ] Understanding Virus Behavior in 32-bit Operating Environments.pdf                                                 65K  
[   ] Understanding and Managing Polymorphic Viruses.pdf                                                                94K  
[   ] Unexpected Resutls [sic].pdf                                                                                      39K  
[   ] Universal Procedures to Protect Against Computer Viruses.pdf                                                     6.2K  
[   ] Unknown Computer Virus Detection Inspired by Immunity.pdf                                                        430K  
[   ] Unknown Malcode Detection and the Imbalance Problem.pdf                                                          1.2M  
[   ] Unknown Malcode Detection via Text Categorization and the Imbalance Problem.pdf                                  171K  
[   ] Unknown Malicious Code Detection # Practical Issues.pdf                                                          162K  
[   ] Unpredictable Legacies Viral Games in the Networked World.pdf                                                    200K  
[   ] Use of an Attenuated Computer Virus as a Mechanism for Teaching Epidemiology.pdf                                 320K  
[   ] User-mode memory scanning on 32-bit & 64-bit windows.pdf                                                         262K  
[   ] Using Code Normalization for Fighting Self-Mutating Malware.pdf                                                  121K  
[   ] Using Engine Signature to Detect Metamorphic Malware.pdf                                                         266K  
[   ] Using Entropy Analysis to Find Encrypted and Packed Malware.pdf                                                  467K  
[   ] Using Formal Grammar and Genetic Operators to Evolve Malware.pdf                                                 388K  
[   ] Using Malware to Improve Software Quality and Security.pdf                                                       160K  
[   ] Using Markov Chains to Filter Machine-morphed Variants of Malicious Programs.pdf                                  96K  
[   ] Using Plant Epidemiological Methods To Track Computer Network Worms.pdf                                          2.3M  
[   ] Using Predators to Combat Worms and Viruses A Simulation-Based Study.pdf                                         572K  
[   ] Using Qualia and Hierarchical Models in Malware Detection.pdf                                                    141K  
[   ] Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection.pdf        513K  
[   ] Using Support Vector Machine to Detect Unknown Computer Viruses.pdf                                              359K  
[   ] Using Verification Technology to Specify and Detect Malware.pdf                                                   81K  
[   ] Using Virtualisation to Protect Against Zero-Day Attacks.pdf                                                     1.1M  
[   ] Using biological models to improve innovation systems.pdf                                                        201K  
[   ] Using the KBTA method for inferring computer and network security.pdf                                            1.8M  
[   ] Utilizing Entropy to Identify Undetected Malware.pdf                                                             491K  
[   ] VIRUS, Very Important Resource Under Siege.pdf                                                                    38K  
[   ] VT Integrity Services for Networking.pdf                                                                         608K  
[   ] VX Reversing I, the basics.pdf                                                                                   113K  
[   ] VX Reversing II, Sasser.B.pdf                                                                                     92K  
[   ] Viral Attacks On UNIX System Security.pdf                                                                        669K  
[   ] Viral Bodies, Virtual Practices.pdf                                                                              632K  
[   ] Viral Evolution.pdf                                                                                              128K  
[   ] Viral Style Technology, Culture, and the Politics of Infection.pdf                                                36K  
[   ] Viral polymorphism.pdf                                                                                           161K  
[   ] Virentechniken Analyse und Metamorphismus.pdf                                                                     64K  
[   ] Virii Generators Understanding the Threat.pdf                                                                    282K  
[   ] Virology 101.pdf                                                                                                  21K  
[   ] Virology_101(Usenix).pdf                                                                                         359K  
[   ] Virus Detection System - VDS.pdf                                                                                 575K  
[   ] Virus Inoculation on Social Graphs The Friendship Factor.pdf                                                     217K  
[   ] Virus Prevention Without Signatures.pdf                                                                          531K  
[   ] Virus Prevention, Cure and Hoaxes.pdf                                                                            114K  
[   ] Virus Protection.pdf                                                                                              80K  
[   ] Virus Scanners for Multiple OSes.pdf                                                                             348K  
[   ] Virus Spread in Networks.pdf                                                                                     436K  
[   ] Virus Techniques.pdf                                                                                             402K  
[   ] Virus Trends 2003-2004.pdf                                                                                       9.3K  
[   ] Virus Tutorial.pdf                                                                                               2.7M  
[   ] Virus Verification and Removal Tools and Techniques.pdf                                                          147K  
[   ] Virus Writers 360.pdf                                                                                            369K  
[   ] Virus Writers The End of The Innocence.pdf                                                                       109K  
[   ] Virus als Metapher.pdf                                                                                           2.2M  
[   ] Virus attack - how computer networks could heal themselves.pdf                                                    97K  
[   ] Virus authors faster to the kill.pdf                                                                             142K  
[   ] Virus detection using datamining techniques.pdf                                                                  297K  
[   ] Virus ex machina res ipsa loquitur.pdf                                                                           568K  
[   ] VirusMeter  Preventing Your Cellphone from Spies.pdf                                                             463K  
[   ] Viruses & spam fuel new laws.pdf                                                                                 156K  
[   ] Viruses 101.pdf                                                                                                   92K  
[   ] Viruses Are Beginning to Get to Me!.pdf                                                                          116K  
[   ] Viruses Are Not Speech.pdf                                                                                        79K  
[   ] Viruses Bottleneck Prosecution.pdf                                                                               349K  
[   ] Viruses Revealed Understanding and Counter Malicious Software.pdf                                                 50M  
[   ] Viruses That Intricate Yarn.pdf                                                                                   93K  
[   ] Viruses a concern for all of us.pdf                                                                               59K  
[   ] Viruses and Computer Security.pdf                                                                                185K  
[   ] Viruses and Criminal Law.pdf                                                                                     729K  
[   ] Viruses and Lotus Notes- Have the Virus Writers Finally Met Their Match.pdf                                      204K  
[   ] Viruses and Worms The Best Defense is Awareness.pdf                                                              277K  
[   ] Viruses and Worms The Inside Story.pdf                                                                           414K  
[   ] Viruses and Worms--What Can You Do.pdf                                                                           1.2M  
[   ] Viruses and Worms.pdf                                                                                            311K  
[   ] Viruses and the Law.pdf                                                                                          155K  
[   ] Viruses in France The French Connection - II.pdf                                                                 121K  
[   ] Viruses using .NET Framework.pdf                                                                                  40K  
[   ] Viruses, Worms, Zombies, and other Beasties.pdf                                                                  1.1M  
[   ] Viruses, Worms, and Trojan Horses Serious Crimes, Nuisance, or Both.pdf                                          142K  
[   ] Visualizing Windows Executable Viruses Using Self-Organizing Maps.pdf                                            531K  
[   ] Vulnerabilities as monsters the cultural foundations of computer security (extended abstract).pdf                 67K  
[   ] Vx-trading.pdf                                                                                                    71K  
[   ] WORM AND VIRUS DEFENSE HOW CAN WE PROTECT THE NATION'S COMPUTERS FROM THESE THREATS.pdf                          5.6M  
[   ] Warnings of a Dark Future The Emergence of Machine Intelligence.pdf                                               93K  
[   ] Web Sites Hawk Instructions On Making Computer Viruses.pdf                                                       8.5K  
[   ] What is Wild.pdf                                                                                                  83K  
[   ] What's in a Name.pdf                                                                                              59K  
[   ] What's the difference between a Virus, Worm, and Trojan horse.pdf                                                 22K  
[   ] When Computer Viruses Strike.pdf                                                                                 130K  
[   ] When Java Was One Threats From Hostile Byte Code.pdf                                                              38K  
[   ] When Malware Meets Rootkits.pdf                                                                                  493K  
[   ] Where have the worms and viruses gone - new trends in malware.pdf                                                 91K  
[   ] White-box attack context cryptovirology.pdf                                                                      301K  
[   ] Why Anti-Virus Software Cannot Stop the Spread of Email Worms.pdf                                                129K  
[   ] Windows Rootkit Overview.pdf                                                                                      95K  
[   ] Windows Rootkits.pdf                                                                                             146K  
[   ] Winning the battles, losing the war Rethinking methodology for forensic computing research.pdf                   139K  
[   ] With Microscope and Tweezers An Analysis of the Internet Virus of November 1988.pdf                              193K  
[   ] With Microscope and Tweezers The Worm from MITS Perspective.pdf                                                  1.2M  
[   ] Worm Analysis through Computer Simulation.pdf                                                                    318K  
[   ] Worm Anatomy and Model.pdf                                                                                       267K  
[   ] Worm Detection Using Local Networks.pdf                                                                          372K  
[   ] Worm Epidemics in High-Speed Networks.pdf                                                                        145K  
[   ] Worm Epidemiology.pdf                                                                                            352K  
[   ] Worm Hotspots Explaining Non-Uniformity in Worm Targeting Behavior.pdf                                           383K  
[   ] Worm Meets Beehive.pdf                                                                                           298K  
[   ] Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense.pdf                                      253K  
[   ] Worm wars.pdf                                                                                                    447K  
[   ] Worms of the future.pdf                                                                                          192K  
[   ] Writing disassembler.pdf                                                                                          27K  
[   ] You've got M()a(D)i(L+K)l.pdf                                                                                     41K  
[   ] Young Nussbaum Monin PSPB 2007.pdf                                                                               194K  
[   ] Zero-hour, Real-time Computer Virus Defense through Collaborative Filtering.pdf                                   70K  
[   ] Zeroing in on Metamorphic Computer Viruses.pdf                                                                   402K  
[   ] Zmist Opportunities.pdf                                                                                          119K  
[   ] creation dun Web Worm.pdf                                                                                        155K  
[   ] polyunpack.pdf                                                                                                   372K  


© 2013-2017 - nnt.es


email feed