• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,584
Next 10 →

Malicious Code

by W. Eric Wong, Vidroha Debroy , 2008
"... Malicious code is as big of a problem today as it ever was, if not larger still. Software is becoming increasingly more complex, and many software systems themselves do not operate in isolation but rather are connected and in fact sometimes dependent on other systems. An attack on a software system ..."
Abstract - Add to MetaCart
Malicious code is as big of a problem today as it ever was, if not larger still. Software is becoming increasingly more complex, and many software systems themselves do not operate in isolation but rather are connected and in fact sometimes dependent on other systems. An attack on a software system

Malicious Codes in Depth

by Mohammad Heidari
"... Dedicated to my Grand Master- Hemmatabadi – The fine man Who left me too soon, He is truly missed. The art of war teaches us to rely not on the likelihood of the enemy’s not coming but on our own readiness to receive him, not on the chance of he is not attacking, but rather on the fact that we have ..."
Abstract - Add to MetaCart
made our position unassailable.- "The Art of War " – Sun Tzu Malicious code refers to a broad category of software threats to your network and systems. Perhaps the most sophisticated types of threats to computer systems are presented by malicious codes that exploit vulnerabilities

Malicious Codes in Mobile Phones

by Ankur Singh Bist
"... In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems. ..."
Abstract - Add to MetaCart
In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems.

Model Checking Malicious Code

by Fakultät Für Informatik, Johannes Kinder
"... verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. Recent years have seen a dramatic increase of security incidents on the Internet related to e-mail worms. These particular pieces of malicious code are often developed by mischievous teenagers and are not very skillfully engine ..."
Abstract - Add to MetaCart
verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. Recent years have seen a dramatic increase of security incidents on the Internet related to e-mail worms. These particular pieces of malicious code are often developed by mischievous teenagers and are not very skillfully

Rootkits and Malicious Code Injection

by Marius Vlad , 2011
"... Rootkits, are considered by many to be one of the most stealthy computer malware(malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel. As this can be achieved by loadab ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Rootkits, are considered by many to be one of the most stealthy computer malware(malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel. As this can be achieved

Behavioral and Structural Properties of Malicious Code

by Christopher Kruegel , 2005
"... Introduction Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker when run. Typical examples of malware include viruses, worms, and spyware. The damage caused by malicious code has dramatically increased in the past few years. This is due t ..."
Abstract - Add to MetaCart
Introduction Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker when run. Typical examples of malware include viruses, worms, and spyware. The damage caused by malicious code has dramatically increased in the past few years. This is due

Automated Analyses of Malicious Code

by Kris Mikael Krister, Supervisor Torbjørn Skramstad , 2009
"... Malware (malicious software) is a general term for any malicious program such as a virus, worm, trojan, bot or rootkit. The prevalence of malware is rapidly growing on the Internet and poses an increasing threat to computer systems. Effective incident handling can be achieved by analysing malware in ..."
Abstract - Add to MetaCart
Malware (malicious software) is a general term for any malicious program such as a virus, worm, trojan, bot or rootkit. The prevalence of malware is rapidly growing on the Internet and poses an increasing threat to computer systems. Effective incident handling can be achieved by analysing malware

Malicious Codes in Network

by Bimal Kumar Mishra, Apeksha Prajapati
"... Abstract — This paper introduces differential susceptible e-epidemic model ..."
Abstract - Add to MetaCart
Abstract — This paper introduces differential susceptible e-epidemic model

Malicious Code Detection in Digital Forensics

by Sage Latorra, Cs Digital Forensics
"... Executive Summary: In a digital forensics investigation it is often the case that the system under analysis has been attacked or modified by malicious code. This paper investigates current malicious code detection techniques (primarily signatures) including the weak points in them, and new technique ..."
Abstract - Add to MetaCart
Executive Summary: In a digital forensics investigation it is often the case that the system under analysis has been attacked or modified by malicious code. This paper investigates current malicious code detection techniques (primarily signatures) including the weak points in them, and new

Trusting Software: Malicious Code Analyses

by Sam Nitzberg, Et. Al
"... Abstract – Malicious code is a real danger to defense systems, regardless of whether it is a programming flaw that can be exploited by an attacker, or something more directly sinister in nature, such as a computer virus or Trojan horse. Malicious code can threaten the integrity, confidentiality and ..."
Abstract - Add to MetaCart
Abstract – Malicious code is a real danger to defense systems, regardless of whether it is a programming flaw that can be exploited by an attacker, or something more directly sinister in nature, such as a computer virus or Trojan horse. Malicious code can threaten the integrity, confidentiality
Next 10 →
Results 1 - 10 of 1,584
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University