New Thoughts in Ring3 NT Rootkit
An Email Worm Vaccine Architecture
A Bypass of Cohen's Impossibility Result
A Comprehensive Program for Preventing and Detecting Computer Viruses is Needed
A Plague of Viruses Biological, Computer and Marketing
A Self-reproducing Analogue
Malicious Origami in PDF
Malware Normalization
MetaAware Identifying Metamorphic Malware
Mathematical Viruses
An Overview of Unix Rootkits
C# E Kitap Downloadx
Analyzing Worms and Network Traffic Using Compression
Analysis of a Scanning Model of Worm Propagation
William L. Shirer - Nazi Imparatorlugu 1
Static Analysis of Binary Code to Isolate Malicious Behaviors
An Architecture for Generating Semantic-Aware Signatures
Survey on Malware Detection Methods
Slamdunk
Malware Pattern Scanning Schemes Secure Against Black-box Analysis