×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
covert.io
/
Parent Folder
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides.pdf
PDF
5 years ago
1.42 MB
Copy Link
Large-Scale Malware Analysis, Detection, and Signature Generation.pdf
PDF
5 years ago
1.98 MB
Copy Link
Leveraging Honest Users - Stealth Command-and-Control of Botnets.pdf
PDF
5 years ago
1.05 MB
Copy Link
Kopis - Detecting malware domains at the upper dns hierarchy.pdf
PDF
5 years ago
1.14 MB
Copy Link
Local System Security via SSHD Instrumentation .pdf
PDF
5 years ago
539.63 kB
Copy Link
Investigating Advanced Persistent Threat 1 (APT1).pdf
PDF
5 years ago
809.30 kB
Copy Link
MISHIMA - Multilateration of Internet hosts hidden using malicious fast-flux agents.pdf
PDF
5 years ago
124.05 kB
Copy Link
Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf
PDF
5 years ago
1.00 MB
Copy Link
Machine learning in adversarial environments.pdf
PDF
5 years ago
46.68 kB
Copy Link
Indexing Million of Packets per Second using GPUs.pdf
PDF
5 years ago
394.68 kB
Copy Link
Malware files clustering based on file geometry and visualization using R language.pdf
PDF
5 years ago
913.19 kB
Copy Link
Image Matching for Branding Phishing Kit Images.pdf
PDF
5 years ago
952.16 kB
Copy Link
Malware vs Big Data (Ubrella Labs).pdf
PDF
5 years ago
10.08 MB
Copy Link
Image Matching for Branding Phishing Kit Images - slides.pdf
PDF
5 years ago
1.15 MB
Copy Link
McPAD - A multiple classifier system for accurate payload-based anomaly detection.pdf
PDF
5 years ago
882.94 kB
Copy Link
HMMPayl - An intrusion detection system based on Hidden Markov Models.pdf
PDF
5 years ago
1.88 MB
Copy Link
Measuring and Detecting Malware Downloads in Live Network Traffic.pdf
PDF
5 years ago
663.42 kB
Copy Link
HITB2013AMS - Defending The Enterprise, the Russian Way.pdf
PDF
5 years ago
4.57 MB
Copy Link
Measuring pay-per-install - the commoditization of malware distribution.pdf
PDF
5 years ago
1.32 MB
Copy Link
Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications.pdf
PDF
5 years ago
1.07 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.