Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Cujo - Efficient detection and prevention of drive-by-download attacks.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
covert.io
/
Parent Folder
Cujo - Efficient detection and prevention of drive-by-download attacks.pdf
PDF
5 years ago
381.33 kB
Copy Link
Crawling BitTorrent DHTs for Fun and Proο¬t.pdf
PDF
5 years ago
337.31 kB
Copy Link
CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers.pdf
PDF
5 years ago
636.42 kB
Copy Link
Connected Colors - Unveiling the Structure of Criminal Networks.pdf
PDF
5 years ago
3.55 MB
Copy Link
DSpin - Detecting Automatically Spun Content on the Web.pdf
PDF
5 years ago
2.81 MB
Copy Link
Comparing anomaly detection techniques for HTTP.pdf
PDF
5 years ago
266.80 kB
Copy Link
Decoy Document Deployment for Effective Masquerade Attack Detection.pdf
PDF
5 years ago
921.73 kB
Copy Link
CloudFence - Data Flow Tracking as a Cloud Service.pdf
PDF
5 years ago
273.37 kB
Copy Link
Demystifying service discovery - Implementing an internet-wide scanner.pdf
PDF
5 years ago
813.95 kB
Copy Link
Casting out demons - Sanitizing training data for anomaly sensors.pdf
PDF
5 years ago
375.81 kB
Copy Link
Deobfuscating Embedded Malware using Probable-Plaintext Attacks.pdf
PDF
5 years ago
414.65 kB
Copy Link
CAMP - Content Agnostic Malware Protection.pdf
PDF
5 years ago
308.15 kB
Copy Link
Detecting Logic Vulnerabilities in E-Commerce Applications.pdf
PDF
5 years ago
1.46 MB
Copy Link
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling.pdf
PDF
5 years ago
285.18 kB
Copy Link
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine.pdf
PDF
5 years ago
499.91 kB
Copy Link
Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation.pdf
PDF
5 years ago
139.79 kB
Copy Link
Detecting Traffic Snooping in Tor Using Decoys.pdf
PDF
5 years ago
866.03 kB
Copy Link
BitShred - Fast, Scalable Malware Triage.pdf
PDF
5 years ago
2.80 MB
Copy Link
Detecting unknown network attacks using language models.pdf
PDF
5 years ago
190.15 kB
Copy Link
BitShred - Fast, Scalable Code Reuse Detection in Binary Code.pdf
PDF
5 years ago
182.24 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.