×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Privacy-preserving payload-based correlation for accurate malicious traffic detection.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
covert.io
/
Parent Folder
Privacy-preserving payload-based correlation for accurate malicious traffic detection.pdf
PDF
5 years ago
229.69 kB
Copy Link
Practical Comprehensive Bounds on Surreptitious Communication Over DNS.pdf
PDF
5 years ago
4.75 MB
Copy Link
Protecting a moving target - Addressing web application concept drift.pdf
PDF
5 years ago
557.32 kB
Copy Link
Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides.pdf
PDF
5 years ago
1.78 MB
Copy Link
Putting out a HIT - Crowdsourcing Malware Installs.pdf
PDF
5 years ago
1.87 MB
Copy Link
Polonium - Tera-Scale Graph Mining for Malware Detection.pdf
PDF
5 years ago
1.37 MB
Copy Link
ReDeBug - finding unpatched code clones in entire os distributions.pdf
PDF
5 years ago
388.09 kB
Copy Link
PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.pdf
PDF
5 years ago
4.08 MB
Copy Link
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework.pdf
PDF
5 years ago
193.92 kB
Copy Link
PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation.pdf
PDF
5 years ago
279.48 kB
Copy Link
Revealing Botnet Membership Using DNSBL Counter-Intelligence.pdf
PDF
5 years ago
180.05 kB
Copy Link
PAYL - Anomalous Payload-based Network Intrusion Detection.pdf
PDF
5 years ago
284.66 kB
Copy Link
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware.pdf
PDF
5 years ago
2.21 MB
Copy Link
Outside the Closed World - On Using Machine Learning For Network Intrusion Detection.pdf
PDF
5 years ago
158.47 kB
Copy Link
Risks and Realization of HTTPS Traffic Analysis.pdf
PDF
5 years ago
672.92 kB
Copy Link
On the infeasibility of modeling polymorphic shellcode.pdf
PDF
5 years ago
398.97 kB
Copy Link
Scalable fine-grained behavioral clustering of http-based malware.pdf
PDF
5 years ago
797.80 kB
Copy Link
On the Mismanagement and Maliciousness of Networks.pdf
PDF
5 years ago
331.80 kB
Copy Link
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist.pdf
PDF
5 years ago
2.26 MB
Copy Link
On the Feasibility of Online Malware Detection with Performance Counters.pdf
PDF
5 years ago
1.21 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.