E-Books durchsuchen
Detection of Intrusions and Malware, and Vulnerability Assessment [2014]
- 1
-
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces!
- 21
-
Identifying Shared Software Components to Support Malware Forensics
- 41
-
Instruction-Level Steganography for Covert Trigger-Based Malware
- 51
-
AndRadar: Fast Discovery of Android Applications in Alternative Markets
- 72
-
Attacks on Android Clipboard
- 92
-
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics
- 112
-
AV-Meter: An Evaluation of Antivirus Scans and Labels
- 132
-
PExy: The Other Side of Exploit Kits
- 152
-
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware
- 172
-
Parallelization of Network Intrusion Detection Systems under Attack Conditions
- 192
-
Phoenix: DGA-Based Botnet Tracking and Intelligence
- 212
-
Quantifiable Run-Time Kernel Attack Surface Reduction
- 235
-
Bee Master: Detecting Host-Based Code Injection Attacks
- 255
-
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits