16,567 research outputs found
History of malware
In past three decades almost everything has changed in the field of malware
and malware analysis. From malware created as proof of some security concept
and malware created for financial gain to malware created to sabotage
infrastructure. In this work we will focus on history and evolution of malware
and describe most important malwares.Comment: 11 pages, 8 figures describing history and evolution of PC malware
from first PC malware to Stuxnet, DoQu and Flame. This article has been
withdrawed due some errors in text and publication in the jurnal that asked
to withdraw article from other source
Community Self Help
This paper advocates controlling crime through a greater emphasis on precautions taken not by individuals, but by communities. The dominant battles in the literature today posit two central competing models of crime control. In one, the standard policing model, the government is responsible for the variety of acts that are necessary to deter and prosecute criminal acts. In the other, private self-help, public law enforcement is largely supplanted by providing incentives to individuals to self-protect against crime. There are any number of nuances and complications in each of these competing stories, but the literature buys into this binary matrix
Методичні вказівки з розвитку навичок читання спеціальної літератури за фахом
Дані методичні вказівки призначені для самостійної та аудиторної роботи студентів І-ІІI курсів факультету КІТ. Вони мають за мету розвиток навичок читання літератури за фахом, з використанням типових завдань з технік анотування та реферування, спрямованих на краще оволодіння змістом. Матеріал вказівок містить 15 текстів, присвячених різним галузям інформатики та обчислювальної техніки, а також інформаційних технологій. Дані методичні вказівки складено на базі матеріалів автентичного курсу, розробленого Оксфордським університетом, а також з використанням матеріалів Інтернету
Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences
In this survey, we first briefly review the current state of cyber attacks,
highlighting significant recent changes in how and why such attacks are
performed. We then investigate the mechanics of malware command and control
(C2) establishment: we provide a comprehensive review of the techniques used by
attackers to set up such a channel and to hide its presence from the attacked
parties and the security tools they use. We then switch to the defensive side
of the problem, and review approaches that have been proposed for the detection
and disruption of C2 channels. We also map such techniques to widely-adopted
security controls, emphasizing gaps or limitations (and success stories) in
current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages.
Listing abstract compressed from version appearing in repor
Spartan Daily, April 22, 1993
Volume 100, Issue 52https://scholarworks.sjsu.edu/spartandaily/8410/thumbnail.jp
Recommended from our members
Triple Helix, Fall 2018
Table of Contents: Science Agenda: The Politics of Grant Writing / by Kavya Rajesh (p. 4) -- From the Experts / by Katherine Bruner (p. 5) -- 3D Printed Drugs: The Future of Pharmaceuticals / by Ethan Wang (p. 6) -- Computerized Markets: Wall Street Takeover / by James Kiraly (p. 10) -- The Evolution of Fear / by Alisha Ahmed (p. 14) -- ADDing Up / by Victor Liaw (p. 18) -- The Clone Wars / by Jina Zhou (p. 22) -- Physician-Assisted Suicide: Drawing the Line / by Haley Wolf (p. 26) -- Supervised Injection Sites / by Alex Gajewski (p. 30) -- On Emerging Medicalization and Health Care / by Patrick Lee (p. 33) -- The Future of Human Gene Modifications / by Elizabeth Robinson (p. 36)College of Natural SciencesUT LibrariesLiberal Art
Spartan Daily, November 21, 2019
Volume 153, Issue 38https://scholarworks.sjsu.edu/spartan_daily_2019/1081/thumbnail.jp
- …