×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Effective Anomaly Detection with Scarce Training Data.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
covert.io
/
Parent Folder
Effective Anomaly Detection with Scarce Training Data.pdf
PDF
5 years ago
490.26 kB
Copy Link
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.pdf
PDF
5 years ago
1.37 MB
Copy Link
Efficient Multidimensional Aggregation for Large Scale Monitoring.pdf
PDF
5 years ago
5.46 MB
Copy Link
EFFORT - Efficient and Effective Bot Malware Detection.pdf
PDF
5 years ago
537.89 kB
Copy Link
Escape from Monkey Island - Evading High-Interaction Honeyclients.pdf
PDF
5 years ago
224.92 kB
Copy Link
Detecting unknown network attacks using language models.pdf
PDF
5 years ago
190.15 kB
Copy Link
Eureka - A framework for enabling static malware analysis.pdf
PDF
5 years ago
961.11 kB
Copy Link
Detecting Traffic Snooping in Tor Using Decoys.pdf
PDF
5 years ago
866.03 kB
Copy Link
ExecScent- Mining for New C and C Domains in Live Networks with Adapive Control Protocol Templates - slides.pdf
PDF
5 years ago
2.13 MB
Copy Link
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine.pdf
PDF
5 years ago
499.91 kB
Copy Link
ExecScent- Mining for New C and C Domains in Live Networks with Adapive Control Protocol Templates.pdf
PDF
5 years ago
3.18 MB
Copy Link
Detecting Logic Vulnerabilities in E-Commerce Applications.pdf
PDF
5 years ago
1.46 MB
Copy Link
Exposure - Finding malicious domains using passive dns analysis.pdf
PDF
5 years ago
297.68 kB
Copy Link
Deobfuscating Embedded Malware using Probable-Plaintext Attacks.pdf
PDF
5 years ago
414.65 kB
Copy Link
Extraction of Statistically Significant Malware Behaviors.pdf
PDF
5 years ago
1.76 MB
Copy Link
Demystifying service discovery - Implementing an internet-wide scanner.pdf
PDF
5 years ago
813.95 kB
Copy Link
FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors.pdf
PDF
5 years ago
645.73 kB
Copy Link
Decoy Document Deployment for Effective Masquerade Attack Detection.pdf
PDF
5 years ago
921.73 kB
Copy Link
FLIPS - Hybrid Adaptive Intrusion Prevention.pdf
PDF
5 years ago
189.42 kB
Copy Link
DSpin - Detecting Automatically Spun Content on the Web.pdf
PDF
5 years ago
2.81 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.