×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [code obfuscation]
View Content
19 views
Legal Issues in Mobile Security Research
281 views
Code Self-checking Techniques for Trusted-Flow Implementation Luca Tagliaferri
[email protected]
220 views
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
189 views
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
225 views
Bioinformatics Techniques for Metamorphic Malware Analysis and Detection: Grijesh
102 views
Sistema de Ofuscacion de Malware Para El Evasion de NIDS
22 views
EFFECTIVE AND EFFICIENT MALWARE DETECTION AT THE END HOST Presentation by Clark Wachsmuth C. Kolbitsch, P. M. Comparetti, C. Kreugel, E. Kirda, X. Zhou
217 views
Dynodroid: An Input Generation System for Android Apps FSE’13 Presented by Haocheng Huang
[email protected]
219 views
Effective and efficient malware detection at the end host
38 views
pBot: an Overview BOEIRA, Felipe
[email protected]
@gmail.com KARL, Fernando
[email protected]
@defenda.com.br
219 views
13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Security-Preserving Operations on Big Data Algorithms for Big Data, Frankfurt, September, 2014
216 views
Next >