×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Collaborative Defense Against Zero-Day and Polymorphic Worms Detection, Response and an Evaluation Framework.pdf
Home
/
Discover
/
index-of.co.uk
/
Viruses
/
Parent Folder
Collaborative Defense Against Zero-Day and Polymorphic Worms Detection, Response and an Evaluation Framework.pdf
PDF
7 years ago
768.99 kB
Copy Link
Code-Red a case study on the spread and victims of an Internet worm.pdf
PDF
7 years ago
327.58 kB
Copy Link
Combating computer viruses.pdf
PDF
7 years ago
246.04 kB
Copy Link
Code obfuscation techniques for metamorphic viruses.pdf
PDF
7 years ago
760.71 kB
Copy Link
Combinatorial Optimisation of Worm Propagation on an Unknown Network.pdf
PDF
7 years ago
465.73 kB
Copy Link
Code obfuscation and virus detection.pdf
PDF
7 years ago
930.05 kB
Copy Link
Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'.pdf
PDF
7 years ago
57.45 kB
Copy Link
Code mutation techniques by means of formal grammars and automatons.pdf
PDF
7 years ago
729.41 kB
Copy Link
Comments on a paper by Voas, Payne & Cohen: ??A model for detecting the existence of software corruption in real time??.pdf
PDF
7 years ago
217.51 kB
Copy Link
Code Red Worm Propagation Modeling and Analysis.pdf
PDF
7 years ago
173.48 kB
Copy Link
Comparative analysis of various ransomware virii.pdf
PDF
7 years ago
1.73 MB
Copy Link
Cobra Fine-grained Malware Analysis using Stealth Localized-executions.pdf
PDF
7 years ago
648.83 kB
Copy Link
Comparing Passive and Active Worm Defenses.pdf
PDF
7 years ago
252.00 kB
Copy Link
Classification of Packed Executables for Accurate Computer Virus Detection.pdf
PDF
7 years ago
195.07 kB
Copy Link
Computational Aspects of Computer Viruses.pdf
PDF
7 years ago
1.36 MB
Copy Link
Classification of Computer Viruses Using the Theory of Affordances.pdf
PDF
7 years ago
226.10 kB
Copy Link
Computer Immunology(Lau).pdf
PDF
7 years ago
327.43 kB
Copy Link
Classification and identification of malicious code based on heuristic techniques utilizing Meta languages.pdf
PDF
7 years ago
1.95 MB
Copy Link
Computer Immunology.pdf
PDF
7 years ago
449.86 kB
Copy Link
Chiba witty blues.pdf
PDF
7 years ago
27.17 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.