default search action
Journal of Computer Virology and Hacking Techniques, Volume 18
Volume 18, Number 1, March 2022
- Alexey E. Zhukov:
Editorial. 1-2 - Denis Denisenko:
Quantum differential cryptanalysis. 3-10 - Kirill Dmitrievich Ermakov:
Hamsi-based parametrized family of hash-functions. 11-24 - Anton Guselev, Ivan Lavrikov:
Is Merkle tree the best option to organize keys? 25-29 - Vladimir M. Fomichev, Dmitry Bobrovskiy, Alisa M. Koreneva, Timur Nabiev, Dmitry Zadorozhny:
Data integrity algorithm based on additive generators and hash function. 31-41 - Alexander A. Varfolomeev:
On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys. 43-47 - Andrey Dmukh, Dmitry Trifonov, A. Chookhno:
Modification of the key schedule of the 2-GOST block cipher and its implementation on FPGA. 49-59 - Denis Fomin:
On the impossibility of an invariant attack on Kuznyechik. 61-67
Volume 18, Number 2, June 2022
- Babak Sadeghiyan, Salman Niksefat:
Editorial. 69-70 - Parvin Rastegari, Willy Susilo:
On delegatability of MDVS schemes. 71-80 - Amir Mohammadzade Lajevardi, Saeed Parsa, Mohammad Javad Amiri:
Markhor: malware detection using fuzzy similarity of system call dependency sequences. 81-90 - Milad Seddigh, Hadi Soleimany:
Cross-VM cache attacks on Camellia. 91-99 - Zeinab Alebouyeh, Amir Jalaly Bidgoly:
Zipf's law analysis on the leaked Iranian users' passwords. 101-116 - Mehrdad Nasseralfoghara, Hamid-Reza Hamidi:
Covert timing channels: analyzing WEB traffic. 117-126 - Mina Ebrahim, Seyyed Alireza Hashemi Golpayegani:
Anomaly detection in business processes logs using social network analysis. 127-139 - Hadi Soleimany, Farokhlagha Moazami:
A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics. 141-146
Volume 18, Number 3, September 2022
- Anupama M. L, P. Vinod, Corrado Aaron Visaggio, M. A. Arya, Josna Philomina, Rincy Raphael, Anson Pinhero, K. S. Ajith, P. Mathiyalagan:
Detection and robustness evaluation of android malware classifiers. 147-170 - Urvashi Rahul Saxena, Taj Alam:
Role based access control using identity and broadcast based encryption for securing cloud data. 171-182 - Yeong Tyng Ling, Nor Fazlida Mohd Sani, Mohd Taufik Abdullah, Nor Asilah Wati Abdul Hamid:
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model. 183-203 - Vladimir M. Fomichev:
About long period sequences. 205-213 - Rosangela Casolare, Giovanni Lacava, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone:
2Faces: a new model of malware based on dynamic compiling and reflection. 215-230 - Anastasia Pereberina, Alexey Kostyushko, Alexander Tormasov:
An approach to dynamic malware analysis based on system and application code split. 231-241 - Partha Ghosh, Shashwat Sinha, Ritu Raj Sharma, Santanu Phadikar:
An efficient IDS in cloud environment using feature selection based on DM algorithm. 243-258 - Ron Stajnrod, Raz Ben Yehuda, Nezer Jacob Zaidenberg:
Attacking TrustZone on devices lacking memory protection. 259-269 - Alexander V. Babash, E. Baranova:
Partially identified Babassu cipher and attack on it. 271-274 - Alexander V. Babash:
XOR ciphers model and the attack to it. 275-283
Volume 18, Number 4, December 2022
- Abhishek Mallik, Anavi Khetarpal, Sanjay Kumar:
ConRec: malware classification using convolutional recurrence. 297-313 - Giorgio Bernardinetti, Dimitri Di Cristofaro, Giuseppe Bianchi:
PEzoNG: Advanced Packer For Automated Evasion On Windows. 315-331 - Franco Tommasi, Christian Catalano, Umberto Corvaglia, Ivan Taurino:
MinerAlert: an hybrid approach for web mining detection. 333-346 - Mohammed Ali Elsiddig, Mohammed Mejri:
Detection of suspicious internet traffic based on differential analysis and logical rules. 347-365 - Mohammadhadi Alaeiyan, Saeed Parsa:
A hierarchical layer of atomic behavior for malicious behaviors prediction. 367-382 - Stavros D. Nikolopoulos, Iosif Polenakis:
Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs. 383-406 - Prachi, Sumit Kumar:
An effective ransomware detection approach in a cloud environment using volatile memory features. 407-424 - Remi Adelin, Cyrius Nugier, Eric Alata, Vincent Nicomette, Vincent Migliore, Mohamed Kaâniche:
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol. 425-452 - Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao:
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning. 453-463
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.