Showing 1 - 5 of 5 results for the Publish Year - 2014 , Type - White Paper
This paper summarizes the Readiness & Fit Analysis and describes its extension to support risk identification for organizations that are adopting agile methods.
In this paper we discuss scalable detection methods for domain names parking on reserved IP address space, and then using this data set, evaluate whether this behavior appears to be indicative of malicious behavior.
In this paper, the authors provide recommendations for addressing problems related to poor management of Consumer Premise Equipment (CPE).
This paper presents the results of a study of non-signature-based approaches to detecting malicious activity in computer network traffic.
This thesis describes a static taint analysis for Android that combines the FlowDroid and Epicc analyses to track inter- and intra-component data flow.