


default search action
Journal of Computer Virology and Hacking Techniques, Volume 14
Volume 14, Number 1, February 2018
- Edward Raff
, Richard Zak
, Russell Cox, Jared Sylvester, Paul Yacci, Rebecca Ward, Anna Tracy, Mark McLean, Charles Nicholas:
An investigation of byte n-gram features for malware classification. 1-20 - Ayesha Binte Ashfaq, Zainab Abaid, Maliha Ismail, Muhammad Umar Aslam, Affan A. Syed, Syed Ali Khayam:
Diagnosing bot infections using Bayesian inference. 21-38 - Annapurna Annadatha, Mark Stamp
:
Image spam analysis and detection. 39-52 - Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
State of the art of network protocol reverse engineering tools. 53-68 - Yoshihiro Oyama
:
Trends of anti-analysis operations of malwares observed in API call logs. 69-85 - Marcus Botacin, Paulo Lício de Geus
, André Ricardo Abed Grégio
:
The other guys: automated analysis of marginalized malware. 87-98 - Yeon-jin Park
, Keun-Ho Lee:
Constructing a secure hacking-resistant IoT U-healthcare environment. 99-106
Volume 14, Number 2, May 2018
- Catalin-Valeriu Lita, Doina Cosovan
, Dragos Gavrilut:
Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. 107-126 - Jorge Blasco, Thomas M. Chen
:
Automated generation of colluding apps for experimental research. 127-138 - AliAkbar Sadeghi, Salman Niksefat
, Maryam Rostamipour:
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions. 139-156 - Suchita Deshmukh, Fabio Di Troia, Mark Stamp
:
Vigenère scores for malware detection. 157-165 - Manar AbuTalib:
Testing closed source software: computer forensic tool case study. 167-179 - Moustafa Saleh
, Tao Li, Shouhuai Xu:
Multi-context features for detecting malicious programs. 181-193
Volume 14, Number 3, August 2018
- Blake Anderson
, Subharthi Paul, David A. McGrew:
Deciphering malware's use of TLS (without decryption). 195-211 - Hamed Haddad Pajouh, Ali Dehghantanha
, Raouf Khayami
, Kim-Kwang Raymond Choo
:
Intelligent OS X malware threat detection with code inspection. 213-223 - A. V. Kozachok, V. I. Kozachok:
Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis. 225-231 - Nikhil Tripathi
, Neminath Hubballi:
Detecting stealth DHCP starvation attack using machine learning approach. 233-244 - Paul Irolla
, Alexandre Dey:
The duplication issue within the Drebin dataset. 245-249
Volume 14, Number 4, November 2018
- Antonella Santone:
Special issue on formal methods for security engineering. 251 - Steffen Pfrang
, David Meier
:
Detecting and preventing replay attacks in industrial automation networks operated with profinet IO. 253-268 - Cinzia Bernardeschi
, Marco Di Natale, Gianluca Dini, Maurizio Palmieri
:
Verifying data secure flow in AUTOSAR models. 269-289 - Robert Luh
, Gregor Schramm, Markus Wagner
, Helge Janicke
, Sebastian Schrittwieser:
SEQUIN: a grammar inference framework for analyzing malicious system behavior. 291-311

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.