Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Malicious-Code'
Malicious-Code published presentations and documents on DocSlides.
Polymorphic Malware Detection
by giovanna-bartolotta
Connor Schnaith, Taiyo Sogawa. 9 April 2012. Moti...
Possibility of system failure Malicious
by tatiana-dople
As with other concerns, the first responsive step ...
Identification of Potential Malicious Web Pages Van Lam Le, Ian Welch,
by jane-oiler
Copyright
Security In
by jane-oiler
VANETs. Zhen . Huang. Student number 5932039. hua...
Test on 11/14 (B-day)
by myesha-ticknor
and 11/15 (A-day). Admonish. Altruistic. Callous....
Screenmilker
by myesha-ticknor
: How to Milk Your Android Screen . for Secrets. ...
Threat Intelligence
by debby-jeon
with Open Source tools. Cornerstones of Trust 201...
Trustworthiness Management in the Social Internet of Things
by calandra-battersby
Michele Nitti, Roberto . Girau. , and Luigi . Atz...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
Detecting drive-by-downloads using human behavior patterns
by pamella-moone
Alex . Crowell, Rutgers University. Computer Scie...
Load More...