Results 1 - 10
of
1,584
Malicious Code
, 2008
"... Malicious code is as big of a problem today as it ever was, if not larger still. Software is becoming increasingly more complex, and many software systems themselves do not operate in isolation but rather are connected and in fact sometimes dependent on other systems. An attack on a software system ..."
Abstract
- Add to MetaCart
Malicious code is as big of a problem today as it ever was, if not larger still. Software is becoming increasingly more complex, and many software systems themselves do not operate in isolation but rather are connected and in fact sometimes dependent on other systems. An attack on a software system
Malicious Codes in Depth
"... Dedicated to my Grand Master- Hemmatabadi – The fine man Who left me too soon, He is truly missed. The art of war teaches us to rely not on the likelihood of the enemy’s not coming but on our own readiness to receive him, not on the chance of he is not attacking, but rather on the fact that we have ..."
Abstract
- Add to MetaCart
made our position unassailable.- "The Art of War " – Sun Tzu Malicious code refers to a broad category of software threats to your network and systems. Perhaps the most sophisticated types of threats to computer systems are presented by malicious codes that exploit vulnerabilities
Malicious Codes in Mobile Phones
"... In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems. ..."
Abstract
- Add to MetaCart
In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems.
Model Checking Malicious Code
"... verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. Recent years have seen a dramatic increase of security incidents on the Internet related to e-mail worms. These particular pieces of malicious code are often developed by mischievous teenagers and are not very skillfully engine ..."
Abstract
- Add to MetaCart
verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. Recent years have seen a dramatic increase of security incidents on the Internet related to e-mail worms. These particular pieces of malicious code are often developed by mischievous teenagers and are not very skillfully
Rootkits and Malicious Code Injection
, 2011
"... Rootkits, are considered by many to be one of the most stealthy computer malware(malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel. As this can be achieved by loadab ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Rootkits, are considered by many to be one of the most stealthy computer malware(malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel. As this can be achieved
Behavioral and Structural Properties of Malicious Code
, 2005
"... Introduction Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker when run. Typical examples of malware include viruses, worms, and spyware. The damage caused by malicious code has dramatically increased in the past few years. This is due t ..."
Abstract
- Add to MetaCart
Introduction Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker when run. Typical examples of malware include viruses, worms, and spyware. The damage caused by malicious code has dramatically increased in the past few years. This is due
Automated Analyses of Malicious Code
, 2009
"... Malware (malicious software) is a general term for any malicious program such as a virus, worm, trojan, bot or rootkit. The prevalence of malware is rapidly growing on the Internet and poses an increasing threat to computer systems. Effective incident handling can be achieved by analysing malware in ..."
Abstract
- Add to MetaCart
Malware (malicious software) is a general term for any malicious program such as a virus, worm, trojan, bot or rootkit. The prevalence of malware is rapidly growing on the Internet and poses an increasing threat to computer systems. Effective incident handling can be achieved by analysing malware
Malicious Codes in Network
"... Abstract — This paper introduces differential susceptible e-epidemic model ..."
Abstract
- Add to MetaCart
Abstract — This paper introduces differential susceptible e-epidemic model
Malicious Code Detection in Digital Forensics
"... Executive Summary: In a digital forensics investigation it is often the case that the system under analysis has been attacked or modified by malicious code. This paper investigates current malicious code detection techniques (primarily signatures) including the weak points in them, and new technique ..."
Abstract
- Add to MetaCart
Executive Summary: In a digital forensics investigation it is often the case that the system under analysis has been attacked or modified by malicious code. This paper investigates current malicious code detection techniques (primarily signatures) including the weak points in them, and new
Trusting Software: Malicious Code Analyses
"... Abstract – Malicious code is a real danger to defense systems, regardless of whether it is a programming flaw that can be exploited by an attacker, or something more directly sinister in nature, such as a computer virus or Trojan horse. Malicious code can threaten the integrity, confidentiality and ..."
Abstract
- Add to MetaCart
Abstract – Malicious code is a real danger to defense systems, regardless of whether it is a programming flaw that can be exploited by an attacker, or something more directly sinister in nature, such as a computer virus or Trojan horse. Malicious code can threaten the integrity, confidentiality
Results 1 - 10
of
1,584