×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [detection of malware]
(2013) similarity metric method of obfuscated malware using function call graph
795 views
Windows Malware Fingerprinting_McVey-1
69 views
Software Development Security. 2 Understand software-based security controls Understand the software development and change/maintenance processes Specialized
218 views
Cellphone and Mobile Device Forensics An update on concepts
31 views
Cellphone and Mobile Device Forensics An update on concepts Presented by Peter L. Fryer ACE, CFE, CISA, MPSC
216 views
Cellphone and Mobile Device Forensics An update on concepts
34 views