default search action
Journal of Computer Virology and Hacking Techniques, Volume 11
Volume 11, Number 1, February 2015
- Diksha Gautam Kumar, Madhumita Chatterjee:
MAC based solution for SQL injection. 1-7 - Vitor Monte Afonso, Matheus Favero de Amorim, André Ricardo Abed Grégio, Glauco Barroso Junquera, Paulo Lício de Geus:
Identifying Android malware using dynamically obtained features. 9-17 - Lachlan Kang:
Efficient botnet herding within the Tor network. 19-26 - Sugandh Shah, Babu M. Mehtre:
An overview of vulnerability assessment and penetration testing techniques. 27-49 - Olivier Ferrand:
How to detect the Cuckoo Sandbox and to Strengthen it? 51-58
Volume 11, Number 2, May 2015
- Chinmayee Annachhatre, Thomas H. Austin, Mark Stamp:
Hidden Markov models for malware classification. 59-73 - Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, R. Nigel Horspool:
Sliding window and control flow weight for metamorphic malware detection. 75-88 - Mangesh Musale, Thomas H. Austin, Mark Stamp:
Hunting for metamorphic JavaScript malware. 89-102 - Ashwin Kalbhor, Thomas H. Austin, Eric Filiol, Sébastien Josse, Mark Stamp:
Dueling hidden Markov models for virus analysis. 103-118
Volume 11, Number 3, August 2015
- Sang-Yeob Oh, Supratip Ghose, Yu-Keum Jeong, Joong-Kyung Ryu, Jung-Soo Han:
Convergence security systems. 119-121 - Eun-Hee Goo, Seung-Dae Lee:
Reconfigurable real number field elliptic curve cryptography to improve the security. 123-128 - Sunghyuck Hong:
Efficient and secure DNS cyber shelter on DDoS attacks. 129-136 - Yoon-Su Jeong, Yong-Tae Kim:
A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography. 137-142 - Jung-Hoon Kim, Keun-Ho Lee:
Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures. 143-148 - Aeri Lee:
Authentication scheme for smart learning system in the cloud computing environment. 149-155 - Sang Chul Lee, Kwang Hyuk Im:
Banking behavior in security and multi-channel environment. 157-164 - Sun-Moon Jo, Kyungyong Chung:
An efficient thread partition policy for secure functional language. 165-171 - Sumi Shin, Suhyeon Yoo, Hyesun Kim, Taeseok Lee:
Association analysis of technology convergence based on information system utilization. 173-179 - Sung Choi:
Study on model fostering for cloud service brokerage. 181-192
Volume 11, Number 4, November 2015
- Valentin Hamon:
Android botnets for multi-targeted attacks. 193-202 - Ranjith Kumar Jidigam, Thomas H. Austin, Mark Stamp:
Singular value decomposition and metamorphic detection. 203-216 - Nizar Kheir, Xiao Han, Chirine Wolley:
Behavioral fine-grained detection and classification of P2P bots. 217-233 - Axelle Apvrille, Ludovic Apvrille:
SherlockDroid: a research assistant to spot unknown malware in Android marketplaces. 235-245 - Bharath Venkatesh, Sudip Hazra Choudhury, Shishir Nagaraja, N. Balakrishnan:
BotSpot: fast graph based identification of structured P2P bots. 247-261
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.