Malware Detection
来源:互联网 发布:mac excel 只读 编辑:程序博客网 时间:2024/06/10 00:06
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e., the good guys are falling behind in the arms race.
http://rapidshare.com/files/23223439/_2006-10__0387327207_Malware_Detection.rar
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e., the good guys are falling behind in the arms race.
http://rapidshare.com/files/23223439/_2006-10__0387327207_Malware_Detection.rar
- Malware Detection
- Semantics-Aware Malware Detection
- Using Markov Chains for Android Malware Detection
- BotHunter – A Network Based Malware Infection Detection System!
- Effective and Efficient Malware Detection at the End Host
- 文献笔记 《DroidMat : Android Malware Detection through Manifest and API Calls Tracing 》
- Mark Graham - Cloud-based Detection Techniques for Botnets and Other Malware
- On the Security of Machine Leanring in Malware C&C Detection: A Survey
- malware-analysis
- malware analysis
- malware analysis
- malware bench
- Malware Corpora
- android malware
- detection
- Nepenthes Malware Collection
- malware analysis 实战
- Reverse-Engineering Malware
- Ontology的研究和应用
- Understanding IPTV
- Outlook 2007 For Dummies
- Microsoft Platform SDK 选择
- 在VC6.0中虚函数的实现原理
- Malware Detection
- Access 2007 Bible
- Windows Vista Secrets
- Web Archiving
- 札记Microsoft基本类库应用程序框架
- Office 2007 All-in-One Desk Reference For Dummies
- Linux Bible 2007 Edition: Boot up Ubuntu, Fedora, KNOPPIX, Debian, SUSE, and 11 Other Distributions
- Web Accessibility: Web Standards and Regulatory Compliance
- log4j文件的配置的详细介绍