种子简介
种子名称:
PDF Pack Release 2
文件类型:
文件数目:
110个文件
文件大小:
85 MB
收录时间:
2013-2-10 08:13
已经下载:
3次
资源热度:
71
最近下载:
2025-9-20 03:49
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:F65D2C8DDA19C9E9367D5CD0AE121BDB3D4C2775&dn=PDF Pack Release 2
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
PDF Pack Release 2.torrent
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf14.03MB
Disk-Level Behavioral Virus Detection.pdf5.45MB
Cryptography all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf4.72MB
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings.pdf4.3MB
Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf3.82MB
Dynamical Models for Computer Viruses Propagation.pdf3.82MB
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings.pdf3.78MB
Defense and Detection Strategies against Internet Worms.pdf2.89MB
Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings.pdf2.83MB
Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings.pdf2.03MB
Directed-Graph Epidemiological Models of Computer Viruses.pdf1.59MB
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf1.54MB
Darwin inside the machines Malware evolution and the consequences for computer security.pdf1.38MB
Detecting Unknown Computer Viruses.pdf1.32MB
Detecting Viral Propagations Using Email Behavior Profiles.pdf1.3MB
Design of a neural network for recognition and classification of computer viruses.pdf1.22MB
Defending against Viruses and Worms.pdf1.19MB
Cryptovirology Extortion-Based Security Threats and Countermeasures.pdf1.14MB
Crisis and Aftermath.pdf1.13MB
Disk-Level Behavioral Malware Detection.pdf1.08MB
Detecting Sources of Computer Viruses in Networks Theory and Experiment.pdf1.07MB
Development of inland lakes as hubs in an invasion network.pdf972.05KB
Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf889.47KB
Concepts and Future Trends in Computer Virology.pdf840.67KB
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf832.71KB
Detecting Kernel-Level Rootkits Through Binary Analysis.pdf788.28KB
Database Rootkits.pdf721.04KB
Detecting Malicious Code by Model Checking.pdf699.54KB
Developing a Trojan applets in a smart card.pdf639.71KB
Distributed Worm Simulation with a Realistic Internet Model.pdf592.89KB
Distributed Computing with a Trojan Horse.pdf590.17KB
Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf573.86KB
Detecting metamorphic viruses using profile hidden markov models.pdf547.6KB
E-mail virus protection handbook.pdf491.92KB
Defeating Polymorphism White Paper.pdf459.17KB
Defeating Polymorphism Beyond Emulation.pdf459.17KB
EPOCalypse NOW!.pdf456KB
Danger theory and collaborative filtering in MANETs.pdf372.18KB
Detection of New Malicious Code Using N-grams Signatures.pdf358.54KB
Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf357.33KB
Concepts of cooperation in artificial life.pdf352.81KB
Control Flow to Detect Malware.pdf344.78KB
Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf343.2KB
Detecting Stealth Software with Strider GhostBuster.pdf323.51KB
Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf317.94KB
Detecting Worms through Cryptographic Hashes.pdf308.37KB
Detecting Virus Mutations Via Dynamic Matching.pdf297.62KB
Des IDS et des vers... D%2b%aetection par l%27analyse statistique %253A de la th%2b%aeorie %2b%e1 la pratique %253F.pdf294.56KB
Conceptual Frameworks for Artificial Immune Systems.pdf283.96KB
Countering Network Worms Through Automatic Patch Generation.pdf281.28KB
Development of Computer Vulnerability Scanning Scanning Workgroup.pdf269.96KB
ELF et virologie informatique.pdf256.94KB
Convergence of Virus Writers and Hackers Fact or Fantasy.pdf255.33KB
Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf250.53KB
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf248.01KB
Conflict and the Computer Information Warfare and Related Ethical Issues.pdf247.92KB
Design of a System for Real-Time Worm Detection.pdf242.58KB
Consensual Realities in Cyberspace.pdf241.64KB
Detecting Worms via Mining Dynamic Program Execution.pdf231.1KB
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf229.76KB
Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf224.84KB
Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf221.83KB
Constructing Malware Normalizers using Term Rewriting.pdf219.17KB
Darwin.pdf216.16KB
Dynamic analysis of malicious code.pdf212.41KB
Detecting Metamorphic Computer Viruses using Supercompilation.pdf211.11KB
Detection of metamorphic computer viruses using algebraic specification.pdf210.96KB
Detecting worms through de-centralized monitoring.pdf202.75KB
Constructing Computer Virus Phylogenies.pdf189.71KB
Do-It-Yourself Guide to Cell Phone Malware.pdf188.35KB
Countering Kernel Rootkits with Lightweight Hook Protection.pdf188.34KB
Detecting Windows Server Compromises with Patchfinder 2.pdf186.94KB
Covert Distributed Processing with Computer Viruses.pdf179.49KB
Contagion and Repetition On the Viral Logic of Network Culture.pdf173.16KB
DCA for Bot Detection.pdf172.76KB
Die Gefahr Von Debug Codes.pdf169.46KB
Detecting Early Worm Propagation through Packet Matching.pdf164.13KB
Defending against Hitlist Worms using Network Address Space Randomization.pdf162.81KB
Control Flow Graphs as Malware Signatures.pdf158.41KB
Data Mining Methods for Detection of New Malicious Executables.pdf157.87KB
Defending Against Internet Worms A Signature-Based Approach.pdf156.39KB
Cryptographic Hashing for Virus Localization.pdf153.67KB
Digital Postmark Helps Fight Spam, Virus Attacks.pdf150.92KB
Countering NetworkWorms Through Automatic Patch Generation.pdf149.77KB
Detection of Metamorphic and Virtualization-based malware using Algebraic Specification_001.pdf146.97KB
Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance.pdf142.78KB
Computers and epidemiology.pdf142.25KB
Defense-In-Depth Against Computer Viruses.pdf141.17KB
Detecting Internet Worms Using Data Mining Techniques.pdf135.53KB
Danger! Deadly new computer viruses want to kill your PC.pdf130.63KB
Contournement dune passerelle antivirus.pdf122.19KB
Console viruses.pdf119.07KB
Contagion on the Internet.pdf118.14KB
Detection of Self-Mutating Computer Viruses.pdf114.46KB
Data security from malicious attack Computer Virus.pdf105.96KB
Defense Against the Dark Arts.pdf100.54KB
Detecting self-mutating malware using control-flow graph matching.pdf98.49KB
Cryptography and Viruses.pdf95.97KB
Computers under attacks!.pdf84.94KB
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector.pdf68.64KB
Do the macarena.pdf57.99KB
Creating a Secure Computer Virus Laboratory.pdf54.02KB
Deelaed learning.pdf46.88KB
Doin' the eagle rock.pdf45.16KB
Crimea river.pdf44.29KB
Criss-cross.pdf43.55KB
Darwin, a Game of Survival of the Fittest among Programs.pdf25.88KB
Corporate Virus Protection.pdf20.24KB
Do The Media Spread Computer Viruses.pdf18.3KB
Controlling Super-Intelligent Machines.pdf17.51KB