Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Malicious-Code'
Malicious-Code published presentations and documents on DocSlides.
A Study of Marriage Divorce Malicious Desertion And Re
by giovanna-bartolotta
1 Introduction 2 A Study of the Pertinent Passages...
EnGarde Protecting the mobile phone from malicious NFC
by stefany-barnette
Gummeson B Priyantha D Ganesan D Thrasher P Z...
EnGarde Protecting the Mobile Phone from Malicious NFC
by stefany-barnette
umassedu bodhipmicrosoftcom ABSTRACT NearFieldComm...
What catches the envious eye Attentional biases within
by alida-meadow
Malicious envy biases attention more toward envie...
This is an Open Access document downloaded from ORCA, Cardiff Universi
by tatyana-admore
ORIGINALRESEARCHARTICLEpublished:26February2015doi...
30. Malicious maiming.
by debby-jeon
G.S. 14 - 30 Page 1
International Journal of Computer Applications (0975
by tatyana-admore
– 8887) Volume 20 – No . 4 , April 2...
Lecture 22: Internet Security
by giovanna-bartolotta
Intro to IT. . COSC1078 Introduction to Informa...
Managing and Protecting Key Company Assets:
by kittie-lecroy
Trade Secrets . Pamela Passman. President and CEO...
Lecture 14
by stefany-barnette
Malicious Software (. cont. ). modified from slid...
Detecting and Characterizing Social Spam Campaigns
by yoshiko-marsland
Hongyu . Gao. , . Jun Hu. , . Christo . Wilson. ,...
An Iterative Algorithm
by jane-oiler
for Trust Management. and Adversary Detection. fo...
Turn to your 8
by natalia-silvester
th. grade vocabulary words, or take notes in you...
LDTS: A Lightweight and Dependable Trust System
by marina-yarberry
for Clustered Wireless Sensor Networks. 1. Presen...
D efending
by trish-goza
against malicious hardware. Sam King. People invo...
Preserving Caller Anonymity in
by test
Voice-over-IP . Networks. Mudhakar Srivatsa, Ling...
Agatha Christie’s
by danika-pritchard
And Then There Were None. Novel Vocabulary. Vocab...
Using
by tatiana-dople
Trust in Distributed Consensus with Adversaries i...
Chapter 14
by tatiana-dople
Computer Security Threats. Seventh Edition. By Wi...
Page 3Instruction 8.2802009 EditionWILFUL AND MALICIOUS DESTRUCTION OF
by alida-meadow
O
Laptop Security in the current IT world
by stefany-barnette
W3 group. Motivation. Companies provide laptops t...
Rozzle
by celsa-spraggs
De-Cloaking Internet Malware. Presenter: Yinzhi C...
Cross-Platform Malware contamination
by lois-ondreau
MSc Information Security . Project 2013/2014. Aut...
Hunting and Decrypting Ghost Communications using Memory fo
by danika-pritchard
Who AM I. Monnappa. KA. Info Security Investigat...
Test on
by tatiana-dople
11/14 (B-day. ). and . 11/15 (A-day. ). Admonish....
Spell words with
by stefany-barnette
the suffix “cious” Group 1 vice vic...
Dissecting Android Malware : Characterization and Evolution
by liane-varnes
Author : . Yajin. Zhou, . Xuxuan. Jiang. TJ. In...
Hatman
by mitsue-stanley
: Intra-cloud Trust Management for Hadoop. Safwan...
Information
by giovanna-bartolotta
management in V2V networks. Computer Science, Mis...
Collaborative Attacks on Routing Protocols in
by briana-ranney
Ad hoc Networks. . Neelima. . Gupta. University...
Secure Computation
by pamella-moone
(. Lecture 3 & 4). Arpita. . Patra. Recap . ...
Test on 11/6 (A-day)
by jane-oiler
and 11/7 (B-day). Alacrity. Assiduous. Bucolic. C...
EnGarde
by natalia-silvester
: Protecting the mobile phone from malicious NFC....
Crowdsourcing:
by tawny-fly
Opportunity or . New . Threat? . Major Area Exam:...
Containing
by mitsue-stanley
DoS Attacks . in . Broadcast Authentication . in ...
CSE 486/586 Distributed Systems
by phoebe-click
Byzantine Fault Tolerance --- 1. Steve Ko. Comput...
The Rise of a Malicious Resolution Authority
by trish-goza
1Weusetheterm
Towards secure and dependable software defined networks
by luanne-stotts
Figure1:SDNmainthreatvectorsmapThreatvector1:forge...
AppContext
by jane-oiler
: Differentiating Malicious and Benign Mobile App...
Security potpourri
by alexa-scheidler
INF 123 – Software architecture. tdebeauv@uci.e...
Load More...