zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
PDF Pack Release 2
magnet:?xt=urn:btih:F65D2C8DDA19C9E9367D5CD0AE121BDB3D4C2775&dn=PDF Pack Release 2
磁力链接详情
文件列表详情
F65D2C8DDA19C9E9367D5CD0AE121BDB3D4C2775
infohash:
110
文件数量
85 MB
文件大小
2013-2-10 08:13
创建日期
2024-11-18 08:20
最后访问
相关分词
PDF
Pack
Release
2
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf 14.03 MB
Disk-Level Behavioral Virus Detection.pdf 5.45 MB
Cryptography all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf 4.72 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings.pdf 4.3 MB
Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf 3.82 MB
Dynamical Models for Computer Viruses Propagation.pdf 3.82 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings.pdf 3.78 MB
Defense and Detection Strategies against Internet Worms.pdf 2.89 MB
Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings.pdf 2.83 MB
Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings.pdf 2.03 MB
Directed-Graph Epidemiological Models of Computer Viruses.pdf 1.59 MB
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf 1.54 MB
Darwin inside the machines Malware evolution and the consequences for computer security.pdf 1.38 MB
Detecting Unknown Computer Viruses.pdf 1.32 MB
Detecting Viral Propagations Using Email Behavior Profiles.pdf 1.3 MB
Design of a neural network for recognition and classification of computer viruses.pdf 1.22 MB
Defending against Viruses and Worms.pdf 1.19 MB
Cryptovirology Extortion-Based Security Threats and Countermeasures.pdf 1.14 MB
Crisis and Aftermath.pdf 1.13 MB
Disk-Level Behavioral Malware Detection.pdf 1.08 MB
Detecting Sources of Computer Viruses in Networks Theory and Experiment.pdf 1.07 MB
Development of inland lakes as hubs in an invasion network.pdf 972.05 KB
Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf 889.47 KB
Concepts and Future Trends in Computer Virology.pdf 840.67 KB
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf 832.71 KB
Detecting Kernel-Level Rootkits Through Binary Analysis.pdf 788.28 KB
Database Rootkits.pdf 721.04 KB
Detecting Malicious Code by Model Checking.pdf 699.54 KB
Developing a Trojan applets in a smart card.pdf 639.71 KB
Distributed Worm Simulation with a Realistic Internet Model.pdf 592.89 KB
Distributed Computing with a Trojan Horse.pdf 590.17 KB
Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf 573.86 KB
Detecting metamorphic viruses using profile hidden markov models.pdf 547.6 KB
E-mail virus protection handbook.pdf 491.92 KB
Defeating Polymorphism White Paper.pdf 459.17 KB
Defeating Polymorphism Beyond Emulation.pdf 459.17 KB
EPOCalypse NOW!.pdf 456 KB
Danger theory and collaborative filtering in MANETs.pdf 372.18 KB
Detection of New Malicious Code Using N-grams Signatures.pdf 358.54 KB
Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf 357.33 KB
Concepts of cooperation in artificial life.pdf 352.81 KB
Control Flow to Detect Malware.pdf 344.78 KB
Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf 343.2 KB
Detecting Stealth Software with Strider GhostBuster.pdf 323.51 KB
Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf 317.94 KB
Detecting Worms through Cryptographic Hashes.pdf 308.37 KB
Detecting Virus Mutations Via Dynamic Matching.pdf 297.62 KB
Des IDS et des vers... D%2b%aetection par l%27analyse statistique %253A de la th%2b%aeorie %2b%e1 la pratique %253F.pdf 294.56 KB
Conceptual Frameworks for Artificial Immune Systems.pdf 283.96 KB
Countering Network Worms Through Automatic Patch Generation.pdf 281.28 KB
Development of Computer Vulnerability Scanning Scanning Workgroup.pdf 269.96 KB
ELF et virologie informatique.pdf 256.94 KB
Convergence of Virus Writers and Hackers Fact or Fantasy.pdf 255.33 KB
Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf 250.53 KB
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf 248.01 KB
Conflict and the Computer Information Warfare and Related Ethical Issues.pdf 247.92 KB
Design of a System for Real-Time Worm Detection.pdf 242.58 KB
Consensual Realities in Cyberspace.pdf 241.64 KB
Detecting Worms via Mining Dynamic Program Execution.pdf 231.1 KB
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf 229.76 KB
Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf 224.84 KB
Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf 221.83 KB
Constructing Malware Normalizers using Term Rewriting.pdf 219.17 KB
Darwin.pdf 216.16 KB
Dynamic analysis of malicious code.pdf 212.41 KB
Detecting Metamorphic Computer Viruses using Supercompilation.pdf 211.11 KB
Detection of metamorphic computer viruses using algebraic specification.pdf 210.96 KB
Detecting worms through de-centralized monitoring.pdf 202.75 KB
Constructing Computer Virus Phylogenies.pdf 189.71 KB
Do-It-Yourself Guide to Cell Phone Malware.pdf 188.35 KB
Countering Kernel Rootkits with Lightweight Hook Protection.pdf 188.34 KB
Detecting Windows Server Compromises with Patchfinder 2.pdf 186.94 KB
Covert Distributed Processing with Computer Viruses.pdf 179.49 KB
Contagion and Repetition On the Viral Logic of Network Culture.pdf 173.16 KB
DCA for Bot Detection.pdf 172.76 KB
Die Gefahr Von Debug Codes.pdf 169.46 KB
Detecting Early Worm Propagation through Packet Matching.pdf 164.13 KB
Defending against Hitlist Worms using Network Address Space Randomization.pdf 162.81 KB
Control Flow Graphs as Malware Signatures.pdf 158.41 KB
Data Mining Methods for Detection of New Malicious Executables.pdf 157.87 KB
Defending Against Internet Worms A Signature-Based Approach.pdf 156.39 KB
Cryptographic Hashing for Virus Localization.pdf 153.67 KB
Digital Postmark Helps Fight Spam, Virus Attacks.pdf 150.92 KB
Countering NetworkWorms Through Automatic Patch Generation.pdf 149.77 KB
Detection of Metamorphic and Virtualization-based malware using Algebraic Specification_001.pdf 146.97 KB
Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance.pdf 142.78 KB
Computers and epidemiology.pdf 142.25 KB
Defense-In-Depth Against Computer Viruses.pdf 141.17 KB
Detecting Internet Worms Using Data Mining Techniques.pdf 135.53 KB
Danger! Deadly new computer viruses want to kill your PC.pdf 130.63 KB
Contournement dune passerelle antivirus.pdf 122.19 KB
Console viruses.pdf 119.07 KB
Contagion on the Internet.pdf 118.14 KB
Detection of Self-Mutating Computer Viruses.pdf 114.46 KB
Data security from malicious attack Computer Virus.pdf 105.96 KB
Defense Against the Dark Arts.pdf 100.54 KB
Detecting self-mutating malware using control-flow graph matching.pdf 98.49 KB
Cryptography and Viruses.pdf 95.97 KB
Computers under attacks!.pdf 84.94 KB
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector.pdf 68.64 KB
Do the macarena.pdf 57.99 KB
Creating a Secure Computer Virus Laboratory.pdf 54.02 KB
Deelaed learning.pdf 46.88 KB
Doin' the eagle rock.pdf 45.16 KB
Crimea river.pdf 44.29 KB
Criss-cross.pdf 43.55 KB
Darwin, a Game of Survival of the Fittest among Programs.pdf 25.88 KB
Corporate Virus Protection.pdf 20.24 KB
Do The Media Spread Computer Viruses.pdf 18.3 KB
Controlling Super-Intelligent Machines.pdf 17.51 KB
其他位置