×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Sherlock Holmes and The Case of the Advanced Persistent Threat.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
covert.io
/
Parent Folder
Sherlock Holmes and The Case of the Advanced Persistent Threat.pdf
PDF
5 years ago
87.67 kB
Copy Link
Selling Off Privacy at Auction.pdf
PDF
5 years ago
1.05 MB
Copy Link
Shingled Graph Disassembly - Finding the Undecideable Path.pdf
PDF
5 years ago
402.26 kB
Copy Link
Self-organized Collaboration of Distributed IDS Sensors.pdf
PDF
5 years ago
3.07 MB
Copy Link
SigMal - A Static Signal Processing Based Malware Triage.pdf
PDF
5 years ago
930.21 kB
Copy Link
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist.pdf
PDF
5 years ago
2.26 MB
Copy Link
SinkMiner- Mining Botnet Sinkholes for Fun and Profit.pdf
PDF
5 years ago
246.58 kB
Copy Link
Scalable fine-grained behavioral clustering of http-based malware.pdf
PDF
5 years ago
797.80 kB
Copy Link
Spamming botnets - signatures and characteristics.pdf
PDF
5 years ago
706.78 kB
Copy Link
Risks and Realization of HTTPS Traffic Analysis.pdf
PDF
5 years ago
672.92 kB
Copy Link
Spectrogram - A mixture-of-markov-chains model for anomaly detection in web traffic.pdf
PDF
5 years ago
212.20 kB
Copy Link
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware.pdf
PDF
5 years ago
2.21 MB
Copy Link
Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic.pdf
PDF
5 years ago
4.66 MB
Copy Link
Revealing Botnet Membership Using DNSBL Counter-Intelligence.pdf
PDF
5 years ago
180.05 kB
Copy Link
The Classification of Valuable Data in an Assumption of Breach Paradigm.pdf
PDF
5 years ago
133.45 kB
Copy Link
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework.pdf
PDF
5 years ago
193.92 kB
Copy Link
The Role of the Underground Market in Twitter Spam and Abuse.pdf
PDF
5 years ago
2.79 MB
Copy Link
ReDeBug - finding unpatched code clones in entire os distributions.pdf
PDF
5 years ago
388.09 kB
Copy Link
The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network.pdf
PDF
5 years ago
1.05 MB
Copy Link
Putting out a HIT - Crowdsourcing Malware Installs.pdf
PDF
5 years ago
1.87 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.