default search action
Journal of Computer Virology and Hacking Techniques, Volume 14
Volume 14, Number 1, February 2018
- Edward Raff, Richard Zak, Russell Cox, Jared Sylvester, Paul Yacci, Rebecca Ward, Anna Tracy, Mark McLean, Charles Nicholas:
An investigation of byte n-gram features for malware classification. 1-20 - Ayesha Binte Ashfaq, Zainab Abaid, Maliha Ismail, Muhammad Umar Aslam, Affan A. Syed, Syed Ali Khayam:
Diagnosing bot infections using Bayesian inference. 21-38 - Annapurna Annadatha, Mark Stamp:
Image spam analysis and detection. 39-52 - Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
State of the art of network protocol reverse engineering tools. 53-68 - Yoshihiro Oyama:
Trends of anti-analysis operations of malwares observed in API call logs. 69-85 - Marcus Botacin, Paulo Lício de Geus, André Ricardo Abed Grégio:
The other guys: automated analysis of marginalized malware. 87-98 - Yeon-jin Park, Keun-Ho Lee:
Constructing a secure hacking-resistant IoT U-healthcare environment. 99-106
Volume 14, Number 2, May 2018
- Catalin-Valeriu Lita, Doina Cosovan, Dragos Gavrilut:
Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. 107-126 - Jorge Blasco, Thomas M. Chen:
Automated generation of colluding apps for experimental research. 127-138 - AliAkbar Sadeghi, Salman Niksefat, Maryam Rostamipour:
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions. 139-156 - Suchita Deshmukh, Fabio Di Troia, Mark Stamp:
Vigenère scores for malware detection. 157-165 - Manar AbuTalib:
Testing closed source software: computer forensic tool case study. 167-179 - Moustafa Saleh, Tao Li, Shouhuai Xu:
Multi-context features for detecting malicious programs. 181-193
Volume 14, Number 3, August 2018
- Blake Anderson, Subharthi Paul, David A. McGrew:
Deciphering malware's use of TLS (without decryption). 195-211 - Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
Intelligent OS X malware threat detection with code inspection. 213-223 - A. V. Kozachok, V. I. Kozachok:
Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis. 225-231 - Nikhil Tripathi, Neminath Hubballi:
Detecting stealth DHCP starvation attack using machine learning approach. 233-244 - Paul Irolla, Alexandre Dey:
The duplication issue within the Drebin dataset. 245-249
Volume 14, Number 4, November 2018
- Antonella Santone:
Special issue on formal methods for security engineering. 251 - Steffen Pfrang, David Meier:
Detecting and preventing replay attacks in industrial automation networks operated with profinet IO. 253-268 - Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, Maurizio Palmieri:
Verifying data secure flow in AUTOSAR models. 269-289 - Robert Luh, Gregor Schramm, Markus Wagner, Helge Janicke, Sebastian Schrittwieser:
SEQUIN: a grammar inference framework for analyzing malicious system behavior. 291-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.