C 7
Bitcoin Security Online Presentation on 2 aug 2014
RSA Report: Bolware – Onyx Variant
2015 Cybersecurity Predictions
How Malware Actually Works?
CuckooSandbox
Malware Mark Ryan University of Birmingham 25 February 2009 Network Security module.
Malware
Automated Malware Analysis
AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction Jianjun Huang, Xiangyu Zhang, Lin Tan,