Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Anomaly-based intrusion detection in software as a service.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
covert.io
/
Parent Folder
Anomaly-based intrusion detection in software as a service.pdf
PDF
5 years ago
204.46 kB
Copy Link
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack.pdf
PDF
5 years ago
325.76 kB
Copy Link
Anonymous Hacking Group -- OpNewblood-Super-Secret-Security-Handbook.pdf
PDF
5 years ago
388.74 kB
Copy Link
An Exploration of Geolocation and Traffic Visualisation Using Network Flows to Aid in Cyber Defence.pdf
PDF
5 years ago
2.71 MB
Copy Link
A static, packer-agnostic filter to detect similar malware samples.pdf
PDF
5 years ago
600.06 kB
Copy Link
Ampliο¬cation Hell - Revisiting Network Protocols for DDoS Abuse.pdf
PDF
5 years ago
465.50 kB
Copy Link
A study of malcode-bearing documents.pdf
PDF
5 years ago
454.40 kB
Copy Link
Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis).pdf
PDF
5 years ago
1.86 MB
Copy Link
A survey on automated dynamic malware-analysis techniques and tools.pdf
PDF
5 years ago
451.35 kB
Copy Link
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.pdf
PDF
5 years ago
302.33 kB
Copy Link
Attacker Economics for Internet-scale Vulnerability Risk Assessment.pdf
PDF
5 years ago
346.75 kB
Copy Link
APT1 Technical backstage (malware.lu hack backs of APT1 servers).pdf
PDF
5 years ago
1.67 MB
Copy Link
Automatic Analysis of Malware Behavior using Machine Learning.pdf
PDF
5 years ago
397.80 kB
Copy Link
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.pdf
PDF
5 years ago
338.22 kB
Copy Link
Back to Basics - Beyond Network Hygiene.pdf
PDF
5 years ago
167.95 kB
Copy Link
A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence.pdf
PDF
5 years ago
937.03 kB
Copy Link
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks.pdf
PDF
5 years ago
326.56 kB
Copy Link
ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection.pdf
PDF
5 years ago
413.96 kB
Copy Link
Behavioral clustering of http-based malware and signature generation using malicious network traces.pdf
PDF
5 years ago
561.84 kB
Copy Link
A Kill Chain Analysis of the 2013 Target Data Breach.pdf
PDF
5 years ago
982.07 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.