malware analysis 实战

来源:王朝搜索
 
malware analysis 实战

NO.1 Honeynet Scan of the Month 32 Analysis Author: Chris Eagle, cseagle at nps d0t edu Answers to

卡巴斯基荣获Anti-Malware白金奖-安全资讯

事实证明,只要网络罪犯们有利可图,他们总会尝试用各种办法躲避安全软件的防护入侵到用户的计算机中。例如,一些恶意程序为了隐藏自身在计算机中的踪迹,经常会干扰计算机中安全软件的安装和运行,他们采用了多

Semantics-Aware Malware Detection

Notes from: "Semantics-Aware Malware Detection" -------- Problem: -------- - o

Semantics-Aware Malware Detection

Notes from: 'Semantics-Aware Malware Detection' --------Problem:-------- - old trend in malware:

RFC4094 - Analysis of Existing Quality-of-Service Signaling Protocols

Network Working Group J. Manner Request for Comments: 4094 X. Fu Category: Informational May 2005

推荐书籍:《协议分析(第7版) Protocol Analysis,WB77.0 》

协议分析(第7版) PRotocol Analysis,WB7.0 出版社:电子工业出版社 原出版社:WestNet 译作者:(美)Kenneth D.Reed著/孙坦/张学峰/杨琳等译 出

RFC2992 - Analysis of an Equal-Cost Multi-Path Algorithm

Network Working Group C. Hopps Request for Comments: 2992 NextHop Technologies Category: Informati

RFC2092 - Protocol Analysis for Triggered RIP

Network Working Group S. Sherry Request for Comments: 2092 Xyplex Category: Informational G. Meyer

RFC1774 - BGP-4 Protocol Analysis

Network Working Group P. Traina, Editor Request for Comments: 1774 cisco Systems Category: Informa

RFC1721 - RIP Version 2 Protocol Analysis

Network Working Group G. Malkin Request for Comments: 1721 Xylogics, Inc. Obsoletes: 1387 November

 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
© 2005- 王朝网络 版权所有