default search action
Journal of Computer Virology and Hacking Techniques, Volume 16
Volume 16, Number 1, March 2020
- Antonella Santone:
Editorial. 1-2 - Eric Filiol, Maxence Delong, J. Nicolas:
Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network. 3-18 - Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, Helge Janicke:
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. 19-61 - Cinzia Bernardeschi, Andrea Domenici, Maurizio Palmieri:
Formalization and co-simulation of attacks on cyber-physical systems. 63-77 - Samanvitha Basole, Fabio Di Troia, Mark Stamp:
Multifamily malware models. 79-92 - Paul Tavolato, Hubert Schölnast, Christina Tavolato-Wötzl:
Analytical modelling of cyber-physical systems: applying kinetic gas theory to anomaly detection in networks. 93-101
Volume 16, Number 2, June 2020
- Samiya Hamadouche, Jean-Louis Lanet, Mohamed Mezghiche:
Hiding a fault enabled virus through code construction. 103-124 - Ali Aghamohammadi, Fathiyeh Faghih:
Lightweight versus obfuscation-resilient malware detection in android applications. 125-139 - Marcus Botacin, Paulo Lício de Geus, André Grégio:
Leveraging branch traces to understand kernel internals from within. 141-155 - Francesco Mercaldo, Antonella Santone:
Deep learning for image-based mobile malware detection. 157-171 - François Plumerault, Baptiste David:
Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws. 173-183
Volume 16, Number 3, September 2020
- Marcus Botacin, Marco Antonio Zanata Alves, André Grégio:
The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support. 185-196 - Vladimir M. Fomichev, Alisa M. Koreneva:
Encryption performance and security of certain wide block ciphers. 197-216 - Jiaxing Cheng, Ying Li, Cheng Huang, Ailing Yu, Tao Zhang:
ACER: detecting Shadowsocks server based on active probe technology. 217-227 - Mugdha Jain, William Andreopoulos, Mark Stamp:
Convolutional neural networks and extreme learning machines for malware classification. 229-244 - Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Roldán Gómez, José Luis Martínez:
An instrumentation based algorithm for stack overflow detection. 245-256
Volume 16, Number 4, December 2020
- Eric Filiol:
Editorial. 257-258 - Vladimir M. Fomichev, Alisa M. Koreneva:
Editorial. 259-260 - Ekaterina Griboedova, Vasily Shishkin:
Not so long, but very rich: a history of Russian crypto standardization. 261-264 - Mikhail Cherepniov:
Comparison of the complexity of Diffie-Hellman and discrete logarithm problems. 265-268 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov:
On post-handshake authentication and external PSKs in TLS 1.3. 269-274 - Nikolay Shenets:
Multi-party pairwise key agreement in linear number of Diffie-Hellman key exchanges. 275-284 - Evgeny K. Alekseev, Kirill S. Goncharenko, Grigory B. Marshalko:
Provably secure counter mode with related-key-based internal re-keying. 285-294 - Alexey Urivskiy, Mikhail A. Borodin, Andrey Rybkin:
Finding distinguishers for pseudorandom number generators based on permutations. 295-303 - Alexey Yu. Nesterenko, Aleksandr M. Semenov:
On the practical implementation of Russian protocols for low-resource cryptographic modules. 305-312 - Valery Vasenin, Alexander Itkes, Maxim A. Krivchikov, Evgeniya Yavtushenko:
ChRelBAC data access control model for large-scale interactive informational-analytical systems. 313-331 - Mikhail A. Kudinov, Alexey A. Chilikov, Evgeniy O. Kiktenko, Aleksey K. Fedorov:
Advanced attribute-based encryption protocol based on the modified secret sharing scheme. 333-341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.