Results 181 to 190 of about 425,588 (208)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 2017 7th International Conference on Communication and Network Security, 2017
Malware-Control Domain is a common and efficacious cybercriminal utensil to remotely control malware-infected machines and steal sensitive information, and cause losses billions dollars every year. Since attackers use creative and obfuscation techniques to evade blacklists and fool users, we propose Doctrina, a novel defense system that allows for ...
Sheng-Yu Chen +4 more
openaire +2 more sources
Malware-Control Domain is a common and efficacious cybercriminal utensil to remotely control malware-infected machines and steal sensitive information, and cause losses billions dollars every year. Since attackers use creative and obfuscation techniques to evade blacklists and fool users, we propose Doctrina, a novel defense system that allows for ...
Sheng-Yu Chen +4 more
openaire +2 more sources
2015
The present study tries to examine the mythic stratification of the 64th poem of Catullus and consider the poet s choices relating to the treatment of mythological material in the epyllion. The myth of Peleus and Thetis occupies a pivotal position in the poem, whereas other mythic stories are being simultaneously developed such as the story of ...
openaire +1 more source
The present study tries to examine the mythic stratification of the 64th poem of Catullus and consider the poet s choices relating to the treatment of mythological material in the epyllion. The myth of Peleus and Thetis occupies a pivotal position in the poem, whereas other mythic stories are being simultaneously developed such as the story of ...
openaire +1 more source

