zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
PDF Pack Release 4
magnet:?xt=urn:btih:35B3B3F844936BE83958E14AF91040ED5F430BA8&dn=PDF Pack Release 4
磁力链接详情
Hash值:
35B3B3F844936BE83958E14AF91040ED5F430BA8
点击数:
25
文件大小:
264.52 MB
文件数量:
239
创建日期:
2013-2-10 08:13
最后访问:
2024-8-25 08:45
访问标签:
PDF
Pack
Release
4
文件列表详情
Selbstreproduktion bei programmen.pdf 37.66 MB
Malicious Cryptography - Exposing Cryptovirology.pdf 29.08 MB
Malware Forensics Investigating and Analyzing Malicious Code.pdf 25.03 MB
Malware Von Viren, Wuermern, Hackern und Trojanern und wie man sich vor ihnen schuetzt.pdf 21.58 MB
Malware Detection.pdf 18.48 MB
PC Magazine Fighting Spyware Viruses and Malware.pdf 10.41 MB
Malware Analyst's Cookbook and DVD.pdf 8.92 MB
Mobile Malware Attacks and Defense.pdf 6.74 MB
On self-reproducing computer programs.pdf 6.2 MB
Rogue Computer Programs.pdf 4.32 MB
Malicious crypto - (Ab)use cryptology.pdf 3.82 MB
Malicious crypto.pdf 3.82 MB
Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf 2.23 MB
Peer-to-Peer Botnets Analysis and Detection.pdf 2.18 MB
Multi-Stage Delivery of Malware.pdf 2.01 MB
On Callgraphs and Generative Mechanisms.pdf 1.85 MB
Malicious origami in PDF.pdf 1.83 MB
Mechanics of Self-reproduction.pdf 1.7 MB
Some Further Theoretical Results about Computer Viruses.pdf 1.63 MB
Prepared testimony and statement for the record on computer virus legislation.pdf 1.51 MB
Rotalum A Tool for Automatic Reverse Engineering of Malware Emulators.pdf 1.48 MB
Simulating malware with MAlSim.pdf 1.4 MB
Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf 1.34 MB
Notes on the Worms programs.pdf 1.27 MB
Polymorphic and Metamorphic Malware Detection.pdf 1.27 MB
Stoned Bootkit.pdf 1.22 MB
On Effectiveness of Defense Systems against Active Worms.pdf 1.2 MB
Reverse Code Engineering An In-Depth Analysis of the Bagle Virus.pdf 1.17 MB
SPARSE A Hybrid System to Detect Malcode-Bearing Documents.pdf 1.17 MB
Measuring and Modeling Computer Virus Prevalence.pdf 1.16 MB
Should We Teach Virus Writing.pdf 1.11 MB
Model for network behaviour under viral attack.pdf 1.1 MB
Practical Detection of Metamorphic Computer Viruses.pdf 1.09 MB
Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf 1.07 MB
Practical overview of a Xen covert channel.pdf 1.07 MB
Metamorphic Virus Analysis and Detection.pdf 1.04 MB
Non-signature based virus detection.pdf 992.05 KB
Procedures To Reduce The Computer Virus Threat.pdf 975.59 KB
Metaphors and Modern Threats Biological, Computer, and Cognitive Viruses.pdf 962.27 KB
Quantitative risk assessment of computer virus attacks on computer networks.pdf 961.24 KB
Rootkits - Detection and prevention.pdf 929.82 KB
Small treatise about e-manipulation for honest people.pdf 915.25 KB
Malware behaviour analysis.pdf 899.34 KB
Panic computing The viral metaphor and computer technology.pdf 876.41 KB
Profile hidden Markov models and metamorphic virus detection.pdf 864.56 KB
Static Detection of Malicious Code in Executable Programs.pdf 792.12 KB
Modeling Malware Spreading Dynamics.pdf 789.93 KB
Morphological Detection of Malware.pdf 786.65 KB
Specification and evaluation of polymorphic shellcode properties using a new temporal logic.pdf 786.02 KB
Measuring virtual machine detection in malware using DSD tracer.pdf 763.83 KB
Static detection and identification of X86 malicious executables A multidisciplinary approach.pdf 688.16 KB
Server-based Virus-protection On UnixLinux.pdf 684.08 KB
Modeling the Effects of Timing Parameters on Virus Propagation.pdf 678.01 KB
New data mining technique to enhance IDS alarms quality.pdf 671.81 KB
Opcodes as Predictor for Malware.pdf 660.17 KB
Modeling the Spread of Active Worms.pdf 632.31 KB
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf 630.55 KB
Prophylaxis for virus propagation and general computer security policy.pdf 617.09 KB
Modeling Computer Viruses.pdf 595.47 KB
Polymorphic virus detection technology.pdf 579.48 KB
Modeling Epidemic Spreading in Mobile Environments.pdf 573.48 KB
Shadow Walker - Raising The Bar For Rootkit Detection.pdf 557.04 KB
SBMDS an interpretable string based malware detection system using SVM ensemble with bagging.pdf 533.29 KB
Modeling Botnet Propagation Using Time Zones.pdf 528.43 KB
Predators Good Will Mobile Codes Combat against Computer Viruses.pdf 513.91 KB
SmartSiren Virus Detection and Alert for Smartphones.pdf 508.67 KB
Malware Detection Based on Suspicious Behavior Identification.pdf 491.92 KB
On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf 487.15 KB
Password Cracking A Game of Wits.pdf 476.59 KB
Malware, Viruses and Log Visualisation.pdf 474.26 KB
PE-Miner Mining Structural Information to Detect Malicious Executables in Realtime.pdf 463.99 KB
Supervisory control of malicious executables.pdf 462.63 KB
Scalable, Behavior-Based Malware Clustering.pdf 461.53 KB
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf 447.71 KB
Sobig, sobigger, sobiggest.pdf 446.92 KB
On JavaScript Malware and related threats.pdf 436.09 KB
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf 433.17 KB
Modern operating systems.pdf 424.98 KB
Malicious Software in Mobile Devices.pdf 394.89 KB
Mimimorphism A New Approach to Binary Code Obfuscation.pdf 386.95 KB
Malware pattern scanning schemes secure against black-box analysis.pdf 384.81 KB
Metaphors And Meta-Experiences In Technology Side Effects A Multimedia Exhibit.pdf 380.11 KB
On the possibility of practically obfuscating programs.pdf 372.56 KB
Misleading Modern Malware.pdf 369.55 KB
Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf 369.41 KB
SinFP, unification of active and passive operating system fingerprinting.pdf 363.69 KB
Shield -- A First Line Worm Defense.pdf 361.59 KB
Malicious Software.pdf 360 KB
Mathematical models on computer viruses.pdf 353.47 KB
Old Win32 Code for a Modern Super-stealth Trojan.pdf 351.79 KB
Reverse Engineering Malware.pdf 351.44 KB
Research in Computer Viruses and Worms.pdf 349.27 KB
Rootkit Hunting vs. Compromise Detection.pdf 339.67 KB
On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf 334.64 KB
Profiles in cyber courage.pdf 330.69 KB
Polymorphing Software by Randomizing Data Structure Layout.pdf 323.75 KB
Model-Based Analysis of Two Fighting Worms.pdf 319.98 KB
Self-reproducing machines.pdf 315.44 KB
On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf 312.52 KB
Malware Normalization.pdf 312 KB
Software Transformations to Improve Malware Detection.pdf 306.87 KB
Malware Detection using Statistical Analysis of Byte-Level File Content.pdf 303.74 KB
Static Analysis of Executables to Detect Malicious Patterns.pdf 302.96 KB
Malicious Codes in Depth.pdf 298.1 KB
Response to the Proposal for a Virus database.pdf 296.43 KB
Pairwise alignment of metamorphic computer viruses.pdf 294.4 KB
Source Code Analysis of Worms.pdf 290.02 KB
Malware Research at SMU.pdf 288.75 KB
Signature Generation and Detection of Malware Families.pdf 287.11 KB
Queuing theory based models for studying intrusion evolution and elimination in computer networks.pdf 277.47 KB
MalwareA Future Framework for Device, Network and Service Management.pdf 275.17 KB
Quantum Malware.pdf 273.4 KB
Recent Worms A Survey and Trends.pdf 268.18 KB
Simulating and optimising worm propagation algorithms.pdf 267.71 KB
PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN P2P NETWORKS.pdf 263.04 KB
New thoughts in ring3 NT rootkit.pdf 260.45 KB
Parallels Between Biological and Computer Epidemics.pdf 260.11 KB
Malware Detection Using Adaptive Data Compression.pdf 256.94 KB
Marginal Networks The Virus between Complexity and Suppression.pdf 251.75 KB
RFID Security Issues in Military Supply Chains.pdf 250.28 KB
Polymorphic Worm Detection Using Structural Information of Executables.pdf 249.88 KB
On the Performance of Internet Worm Scanning Strategies.pdf 248.72 KB
New malware distribution methods threaten signature-based AV.pdf 247.54 KB
Malware comes of age The arrival of the true computer parasite.pdf 243.62 KB
Sandbox Technology Inside AV Scanners.pdf 240.61 KB
Modelling Development of Epidemics with Dynamic Small-World Networks.pdf 233.12 KB
Semantics-Aware Malware Detection.pdf 231.05 KB
Reflections on Trusting Trust.pdf 219.77 KB
On the Spread of Viruses on the Internet.pdf 217.7 KB
Malware Phylogeny Generation using Permutations of Code.pdf 216.92 KB
N-gram analysis for computer virus detection.pdf 216.52 KB
Models of Active Worm Defenses.pdf 210.3 KB
Supercompilation for Equivalence Testing in Metamorphic Computer Viruses Detection.pdf 208.98 KB
Securing Instant Messaging.pdf 206.85 KB
On the Time Complexity of Computer Viruses.pdf 205.62 KB
Self-Nonself Discrimination in a Computer.pdf 205.01 KB
SubVirt Implementing malware with virtual machines.pdf 204.53 KB
On abstract computer virology from a recursion-theoretic perspective.pdf 204.23 KB
Rebels for the System Virus writers, general intellect, cyberpunk and criminal capitalism.pdf 202.06 KB
Stay Safe Online Campaign's AntiVirus Presentation.pdf 200.44 KB
Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis the Bradley Virus.pdf 196.26 KB
Shield Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits.pdf 194.96 KB
Monitoring and Early Warning for Internet Worms.pdf 194.86 KB
Slack Space Sculpting the computer monsters -- virus inspiration.pdf 192.58 KB
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf 191.45 KB
Software Diversity as a Defense Against Viral Propagation Models and Simulations.pdf 190.05 KB
Rootkits Analysis and Detection.pdf 189.64 KB
New threats of Java viruses.pdf 182.55 KB
Stack Shape Analysis to Detect Obfuscated calls in Binaries.pdf 182.05 KB
On Computer Viral Infection and the Effect of Immunization.pdf 179.75 KB
On abstract computer virology from a recursion theoretic perspective.pdf 177.55 KB
Networks, Control, and Life-Forms.pdf 173.68 KB
Polygraph Automatically Generating Signatures for Polymorphic Worms.pdf 170.82 KB
Malicious Cryptography Kleptographic Aspects.pdf 167.57 KB
Open problems in computer virology.pdf 166.67 KB
Software Vaccine Technique and Its Application in Early Virus Finding and Tracing.pdf 165.24 KB
On the Semantics of Self-Unpacking Malware Code.pdf 163.93 KB
MetaAware Identifying Metamorphic Malware.pdf 163.21 KB
Normalizing Metamorphic Malware Using Term Rewriting.pdf 160.86 KB
Survey on Malware Detection Methods.pdf 159.13 KB
Some human dimensions of computer virus creation and infection.pdf 156.42 KB
Superworms and Cryptovirology a Deadly Combination.pdf 153.5 KB
Revealing Packed Malware.pdf 153.06 KB
Seminar Report on Study of Viruses and Worms.pdf 151.73 KB
Suppressing the spread of email malcode using short-term message recall.pdf 150.98 KB
Routing Worm A Fast, Selective Attack Worm based on IP Address Information.pdf 149.3 KB
Network Worms.pdf 149.15 KB
SirCamstantial Evidence.pdf 148.49 KB
Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware.pdf 147.96 KB
On the Effectiveness of Address-Space Randomization.pdf 146.86 KB
Owning Antivirus.pdf 145.12 KB
Scary Networks Viruses as Discursive Practice.pdf 144.74 KB
Malware in Popular Networks.pdf 133.19 KB
Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf 129.79 KB
Modeling Virus Propagation in Peer-to-Peer Networks.pdf 128.96 KB
Potential Threats to WAP Enabled Devices.pdf 128.85 KB
Managing Computer Viruses in a Groupware Environment.pdf 124.35 KB
Prosecuting Computer Virus Authors The Need for an Adequate and Immediate International Solution.pdf 121.81 KB
Self- information systems why not.pdf 119.95 KB
Mind Wars Attack of the Memes.pdf 119.82 KB
On behavioral detection.pdf 119.38 KB
On the definition and classification of cybercrime.pdf 117.31 KB
On the functional validity of the worm-killing worm.pdf 115.97 KB
Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf 115.3 KB
New method of fighting computer viruses announced.pdf 114.79 KB
Nematodes - Beneficial Worms.pdf 114.01 KB
Parallel analysis of polymorphic viral code using automated deduction system.pdf 112.79 KB
Mathematical Viruses.pdf 111.5 KB
Modular worms.pdf 107.9 KB
Structuring ethical curricula in the information age.pdf 106.98 KB
Powerful virus hits computers.pdf 100.32 KB
Stochastic Features of Computer Viruses.pdf 95.69 KB
Spyware and Rootkits - The Future Convergence.pdf 93.57 KB
One-hit models for virus inactivation studies.pdf 91.5 KB
Mathematical Model of Computer Viruses.pdf 90.23 KB
Spyware A Little Knowledge is a Wonderful Thing.pdf 88.74 KB
Reports of computer viruses on the increase.pdf 88.37 KB
Painting the Internet A Different Kind of Warhol Worm.pdf 84.13 KB
N-gram-based Detection of New Malicious Code.pdf 83.59 KB
Mobile Code Threats, Fact or Fiction.pdf 83.15 KB
Next-Generation Viruses Present New Challenges.pdf 83.05 KB
Running head REVERSE ENGINEERING MALWARE.pdf 81.12 KB
Poison Ivy Farmers Virus Collections.pdf 79.94 KB
Malicious Threats to Personal Digital Assistants.pdf 78.75 KB
Resolution based metamorphic computer virus detection using redundancy control strategy.pdf 78.68 KB
Possible Vicarious Liability for Computer Users in the USA.pdf 74 KB
Malware analysis for windows administrators.pdf 72.65 KB
Simulating Bandwidth-Limited Worms, One Graph to Rule Them All.pdf 72.47 KB
Prophet and loss.pdf 71.96 KB
Spyware & Rootkits.pdf 70.8 KB
Reliable Identification of Bounded-length Viruses is NP-complete.pdf 69.54 KB
Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf 67.68 KB
Malicious Data and Computer Security.pdf 63.94 KB
Real world anti-virus product reviews and evaluations - the current state of affairs.pdf 59.27 KB
Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen - Thimbleby.pdf 58.52 KB
Principles of a Computer Immune System.pdf 58.29 KB
Reductions of the general virus detection problem.pdf 57.24 KB
Paradise lost.pdf 55.88 KB
Prescription Medicine.pdf 51.92 KB
Raised hacklez.pdf 50.04 KB
Self-Replicating Turing Machines and Computer Viruses.pdf 48.03 KB
Striking Similarities.pdf 47.23 KB
Malware.pdf 46.72 KB
Mostly harmless.pdf 45.6 KB
Protection of computer systems from computer viruses ethical and practical issues.pdf 43.01 KB
Slamdunk.pdf 42.5 KB
Open Problems in Computer Virus Research.pdf 41.74 KB
Malicious Cryptography Cryptovirology and Kleptography.pdf 41.67 KB
Not Teaching Viruses and Worms Is Harmful.pdf 39.92 KB
Reply to Comment on Framework for Modelling Trojans and Computer Virus Infection by E. Makinen.pdf 38.93 KB
Making a hash of things.pdf 38.84 KB
Something smells fishy.pdf 38.54 KB
Not worthy.pdf 38.3 KB
Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf 31.02 KB
Rootkits - The new wave of invisible malware is here.pdf 30.32 KB
Nimda Worm Shows You Can't Always Patch Fast Enough.pdf 24.48 KB
Slackspace.pdf 22.22 KB
Real-Time Virus Detection System Using iNetmon Engine.pdf 21.19 KB
Sleep-Inducing.pdf 20.87 KB
其他位置