Recently, the illegal users with malicious intention utilize the file sharing site by making normal user's computer a zombie computer, which is a preliminary process for network intrusion attack. The propose scheme is divided into the method for real-time analysis for real-time tracking and the method of cooperative analysis method ...Download Now
Nowadays, malicious codes are significantly increasing, leading to serious damages to information systems. It is worth to note that these codes generally depend on the rootkit techniques to make it more difficult for them to be analyzed and detected. Therefore, it is of paramount importance to research the rootkits to ...Download Now
The Ethernet MAC address is known it is not changed and so highly considered as one of the platform-unique information. Because of the reason, the MAC address has been used as a platform identifier for several public services. This paper surveys, implements and analyzes the extraction methods for the MAC ...Download Now
The obfuscation is a technique that makes programs harder to understand. For such a purpose, it converts a program to a new different version while making them functionally equal to each other. As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?