×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [detection of malware]
(2013) similarity metric method of obfuscated malware using function call graph
798 views
Windows Malware Fingerprinting_McVey-1
70 views
Software Development Security. 2 Understand software-based security controls Understand the software development and change/maintenance processes Specialized
218 views
Cellphone and Mobile Device Forensics An update on concepts
35 views
Cellphone and Mobile Device Forensics An update on concepts Presented by Peter L. Fryer ACE, CFE, CISA, MPSC
225 views
Cellphone and Mobile Device Forensics An update on concepts
36 views