本站已收录 番号和无损神作磁力链接/BT种子 

PDF Pack Release 2

种子简介

种子名称: PDF Pack Release 2
文件类型:
文件数目: 110个文件
文件大小: 85 MB
收录时间: 2013-2-10 08:13
已经下载: 3
资源热度: 71
最近下载: 2025-9-20 03:49

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:F65D2C8DDA19C9E9367D5CD0AE121BDB3D4C2775&dn=PDF Pack Release 2 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

PDF Pack Release 2.torrent
  • Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf14.03MB
  • Disk-Level Behavioral Virus Detection.pdf5.45MB
  • Cryptography all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf4.72MB
  • Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings.pdf4.3MB
  • Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf3.82MB
  • Dynamical Models for Computer Viruses Propagation.pdf3.82MB
  • Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings.pdf3.78MB
  • Defense and Detection Strategies against Internet Worms.pdf2.89MB
  • Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings.pdf2.83MB
  • Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings.pdf2.03MB
  • Directed-Graph Epidemiological Models of Computer Viruses.pdf1.59MB
  • Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf1.54MB
  • Darwin inside the machines Malware evolution and the consequences for computer security.pdf1.38MB
  • Detecting Unknown Computer Viruses.pdf1.32MB
  • Detecting Viral Propagations Using Email Behavior Profiles.pdf1.3MB
  • Design of a neural network for recognition and classification of computer viruses.pdf1.22MB
  • Defending against Viruses and Worms.pdf1.19MB
  • Cryptovirology Extortion-Based Security Threats and Countermeasures.pdf1.14MB
  • Crisis and Aftermath.pdf1.13MB
  • Disk-Level Behavioral Malware Detection.pdf1.08MB
  • Detecting Sources of Computer Viruses in Networks Theory and Experiment.pdf1.07MB
  • Development of inland lakes as hubs in an invasion network.pdf972.05KB
  • Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf889.47KB
  • Concepts and Future Trends in Computer Virology.pdf840.67KB
  • Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf832.71KB
  • Detecting Kernel-Level Rootkits Through Binary Analysis.pdf788.28KB
  • Database Rootkits.pdf721.04KB
  • Detecting Malicious Code by Model Checking.pdf699.54KB
  • Developing a Trojan applets in a smart card.pdf639.71KB
  • Distributed Worm Simulation with a Realistic Internet Model.pdf592.89KB
  • Distributed Computing with a Trojan Horse.pdf590.17KB
  • Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf573.86KB
  • Detecting metamorphic viruses using profile hidden markov models.pdf547.6KB
  • E-mail virus protection handbook.pdf491.92KB
  • Defeating Polymorphism White Paper.pdf459.17KB
  • Defeating Polymorphism Beyond Emulation.pdf459.17KB
  • EPOCalypse NOW!.pdf456KB
  • Danger theory and collaborative filtering in MANETs.pdf372.18KB
  • Detection of New Malicious Code Using N-grams Signatures.pdf358.54KB
  • Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf357.33KB
  • Concepts of cooperation in artificial life.pdf352.81KB
  • Control Flow to Detect Malware.pdf344.78KB
  • Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf343.2KB
  • Detecting Stealth Software with Strider GhostBuster.pdf323.51KB
  • Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf317.94KB
  • Detecting Worms through Cryptographic Hashes.pdf308.37KB
  • Detecting Virus Mutations Via Dynamic Matching.pdf297.62KB
  • Des IDS et des vers... D%2b%aetection par l%27analyse statistique %253A de la th%2b%aeorie %2b%e1 la pratique %253F.pdf294.56KB
  • Conceptual Frameworks for Artificial Immune Systems.pdf283.96KB
  • Countering Network Worms Through Automatic Patch Generation.pdf281.28KB
  • Development of Computer Vulnerability Scanning Scanning Workgroup.pdf269.96KB
  • ELF et virologie informatique.pdf256.94KB
  • Convergence of Virus Writers and Hackers Fact or Fantasy.pdf255.33KB
  • Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf250.53KB
  • Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf248.01KB
  • Conflict and the Computer Information Warfare and Related Ethical Issues.pdf247.92KB
  • Design of a System for Real-Time Worm Detection.pdf242.58KB
  • Consensual Realities in Cyberspace.pdf241.64KB
  • Detecting Worms via Mining Dynamic Program Execution.pdf231.1KB
  • Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf229.76KB
  • Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf224.84KB
  • Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf221.83KB
  • Constructing Malware Normalizers using Term Rewriting.pdf219.17KB
  • Darwin.pdf216.16KB
  • Dynamic analysis of malicious code.pdf212.41KB
  • Detecting Metamorphic Computer Viruses using Supercompilation.pdf211.11KB
  • Detection of metamorphic computer viruses using algebraic specification.pdf210.96KB
  • Detecting worms through de-centralized monitoring.pdf202.75KB
  • Constructing Computer Virus Phylogenies.pdf189.71KB
  • Do-It-Yourself Guide to Cell Phone Malware.pdf188.35KB
  • Countering Kernel Rootkits with Lightweight Hook Protection.pdf188.34KB
  • Detecting Windows Server Compromises with Patchfinder 2.pdf186.94KB
  • Covert Distributed Processing with Computer Viruses.pdf179.49KB
  • Contagion and Repetition On the Viral Logic of Network Culture.pdf173.16KB
  • DCA for Bot Detection.pdf172.76KB
  • Die Gefahr Von Debug Codes.pdf169.46KB
  • Detecting Early Worm Propagation through Packet Matching.pdf164.13KB
  • Defending against Hitlist Worms using Network Address Space Randomization.pdf162.81KB
  • Control Flow Graphs as Malware Signatures.pdf158.41KB
  • Data Mining Methods for Detection of New Malicious Executables.pdf157.87KB
  • Defending Against Internet Worms A Signature-Based Approach.pdf156.39KB
  • Cryptographic Hashing for Virus Localization.pdf153.67KB
  • Digital Postmark Helps Fight Spam, Virus Attacks.pdf150.92KB
  • Countering NetworkWorms Through Automatic Patch Generation.pdf149.77KB
  • Detection of Metamorphic and Virtualization-based malware using Algebraic Specification_001.pdf146.97KB
  • Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance.pdf142.78KB
  • Computers and epidemiology.pdf142.25KB
  • Defense-In-Depth Against Computer Viruses.pdf141.17KB
  • Detecting Internet Worms Using Data Mining Techniques.pdf135.53KB
  • Danger! Deadly new computer viruses want to kill your PC.pdf130.63KB
  • Contournement dune passerelle antivirus.pdf122.19KB
  • Console viruses.pdf119.07KB
  • Contagion on the Internet.pdf118.14KB
  • Detection of Self-Mutating Computer Viruses.pdf114.46KB
  • Data security from malicious attack Computer Virus.pdf105.96KB
  • Defense Against the Dark Arts.pdf100.54KB
  • Detecting self-mutating malware using control-flow graph matching.pdf98.49KB
  • Cryptography and Viruses.pdf95.97KB
  • Computers under attacks!.pdf84.94KB
  • Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector.pdf68.64KB
  • Do the macarena.pdf57.99KB
  • Creating a Secure Computer Virus Laboratory.pdf54.02KB
  • Deelaed learning.pdf46.88KB
  • Doin' the eagle rock.pdf45.16KB
  • Crimea river.pdf44.29KB
  • Criss-cross.pdf43.55KB
  • Darwin, a Game of Survival of the Fittest among Programs.pdf25.88KB
  • Corporate Virus Protection.pdf20.24KB
  • Do The Media Spread Computer Viruses.pdf18.3KB
  • Controlling Super-Intelligent Machines.pdf17.51KB