Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- DNS: a botnet dialect + (2012)
- SKyWIper: A complex malware for targeted attacks + (2012)
- Dorkbot: conquistando Latinoamérica + (2012)
- Malware hunting with the Sysinternals tools + (2012)
- Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant + (2012)
- Cracking the encrypted C&C protocol of the ZeroAccess botnet + (2012)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat + (2012)
- Learning stateful models for network honeypots + (2012)
- ZeuS – P2P+DGA variant – mapping out and understanding the threat + (January 4, 2012)
- Ramnit goes social + (January 5, 2012)
- A peek inside the PickPocket botnet + (January 6, 2012)
- Acquisition and analysis of volatile memory from Android devices + (February 2012)
- Reveton.A + (February 1, 2012)
- TDL4 reloaded: Purple Haze all in my brain + (February 3, 2012)
- Android.Bmaster: A million-dollar mobile botnet + (February 9, 2012)
- The where and why of Hlux + (February 15, 2012)
- Cutwail drives spike in malicious HTML attachment spam + (February 16, 2012)
- Shylock financial malware back 'with a vengeance' + (February 16, 2012)
- Long life to Kelihos! + (February 17, 2012)
- Pramro and Sality - two PEs in a pod + (February 21, 2012)
- Rovnix Reloaded: new step of evolution + (February 22, 2012)