Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Crimeware Toolkit Signature Generation and Detection using Machine Learning
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFD5sguCLlyl4J4gvPmRbm6xtYAxGtQzRB-fA-VSSNl2r0kmpiv_eXFpf9S2UEMo5Sc856Xe-D-BSDlniqjiPZZJRTH0iMM-4h0dCDD3OfT8T2tNPwe2z-zAPorADqO2FyVXG2Xz79RirPaa7O2kXuoGnIXvOMvy9Q1HhUyUw5kcB80c4IGRpiYVUTUGdQfGSVH1VflDWNz1XRpIoby9MTQCJdmG7yfzQ1LpqDzqy7MGm1YL87sFOq6-AmuO2D_NxPtGyW_KLV3I8yCdosV6_vRY1eixWlpETWdpobV3EyxRdy9pgq0qkAe0rdG-wkhI1NKqrA7iKbhbhDKsXjN8t00SsuZ9n07tYP2st8emQQ0DM5xlzaJJSIilNqQgYVaVMKjziMpUDHMHF3wsd_2fSCWxp01mk8ils1NWHPLPSCefGHT-KU4lO
International Journal Of Current Research.
Journal Article : Full Text Online
-
Crimeware Marketplaces and Their Facilitating Technologies
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB6qgnjxDdZHyEG8xeaxu9kFUbQYVLDYWqn1EvYV9WB9VcR_7242qfXiyUsg5JLMbmbmm_1mPoBdHTIZmzgfaFmgAKWJCHjBSYCFCAnnaVoIu9IDejGMuz2atRvQqXthLK2y9omlo1bP0tbIWzZvsH2cYXj08hpY1Sh7ulpLaPBKWsGe0GBGZ2Auigm2s_Rp1p3UXMK0HEflRm2awBjh1vjxyfWIUCuwMh2apjxzXIWbbAm-6hctudb7jmviqg6_SNj1NMf_-6ZlWKxyVP_YbaoVaOjRKszXFPk1OD54OLRyYPqTv-mD1sOhf1n2Tjt-l89Hyu_b8wc_47IaAj669ydFfIPN1-EmO-23z4JKiiGQJmMYB0JhjhkPEx2JBCdEJiQ1FqaYGDDOMUmlNkATKUawiJKooBpLZZAeigpWKOMDNsBnKS9YhKRCiUZIIUEZMuhLCZLEzKQtTdirzZ-_uFEbuYEo5Trl0-vUhO3anHn1x73nP7bc_PvxFiyYpAe5fsJtmB2_fegdJwXhwUw6GNrrLfbKrePB3Mlp56rnlVjd3J21z7M7zzJEr78BXF_ZRg
Technology Innovation Management Review, Volume 4, Issue 11, pp. 28 - 33
Journal Article : Full Text Online
-
Crimeware Marketplaces and Their Facilitating Technologies
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS-QwFA6jgviyeIN1XaUPXh4kTtukTQuiyGi94YNSWdaXkrTpzoC6y3hZ9g_4uz25NFNlFhRfShvSQPudJOecnPMdhNakn5Yh7PNYljXFlBGBec1jHAnhx5wzVguF9I_k9Gd4cZlkvU7nucmF0bHMyj6_t1NlTJaDyldV8Y3_mgpTewN7sK78S35wcHV2WIDtm288AbKtZwC9mYEb6yT7rLxAG0iMyr_9gMy4QaEB7kFy4AqyA9d3SY-q9iX_qqiwc50WbUO3lJc910cLGS8tv_fdr5F_volItNruyG-_NXDVV23ArA5CGL46mTgy4nbO-7e_H6u2PyKgKjHPpPfbJTQNGfaJyXvelmPa7LpL2-IVtBfRpLUdG5qMtws9aDWaFONhcDu0rLtZYqg7X3Nqv9nrXAQi2D56jMKNUMD7E2gqVCrTJJo67p1k185b5zNNZKZDFOynGAZQPUjXDdJNVJ0ep-EY3jGtquSz6Iu1Mbx9A-sc6si7eTTdpDgsoP2d_q4DeKfb3_XaIHsAsqdB9toge22QF1GeHea9Y2xLaeASFDiG4yjifk1ESGgVR4wEElTRKpVJLaSA2Qp6KiclEaxkoQwjoTiACKzOVSVqeId8RV7KeJ0GtKwokZRWVCQpBeO5EjEJU9A6lxBuPrsoLb-8KnNyU4z_10to0_X_Y5hV_tPz27t7LqOZkUh-R5MPw0e5Ysp8rGpvy6oF9gXE83eX
Technology Innovation Management Review, Volume 4, Issue 11, pp. 28 - 33
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
-
An introduction to hacking and crimeware : a pocket guide
https://find.library.duke.edu/catalog/DUKE99119328584708501
Book : View Online
-
Reverse deception : organized cyber threat counter-exploitation
https://find.library.duke.edu/catalog/DUKE99119342050708501
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info