Top View
- Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs
- “Time Bomb” Computer Intrusion Cases, 62 United States Attorneys' Bulletin 30-47 (March 2014)
- THE 12 TYPES of CYBER CRIME There Are Literally a Dozen Ways In
- Updating the Law of Targeting for an Era of Cyberwarfare
- Logic Bomb: an Insider Attack
- Detection of Logic Bombs
- On Cyber Warfare Paul Cornish, David Livingstone, Dave Clemente and Claire Yorke
- CS 458 / 658 Computer Security and Privacy Secure Programs Module
- Program Security/Malware
- Demystifying Anti-Repackaging on Android Antonio Ruggia, Luigi Sciolla
- Programmers As Malicious Insiders–Updated and Revised
- Information Security CS 526 Topic 14
- Triggerscope: Towards Detecting Logic Bombs in Android Applications
- CSO-GUID-0016, Rev 1.0, Malicious Code Protection Guidance
- Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc
- Logic Bombs Blown to Bits
- Malware: Malicious Software
- On Benchmarking the Capability of Symbolic Execution Tools With
- Lecture 11 – Malware
- Trust in Cyberspace Mano Paul, CSSLP, CISSP, AMBCI, MCAD, MCSD, Network+, ECSA
- Basic Concepts in Cyber Warfare