default search action
Journal of Computer Virology and Hacking Techniques, Volume 19
Volume 19, Number 1, March 2023
- Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, Mark Stamp:
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. 1-16 - Mariapia Raimondo, Simona Bernardi, Stefano Marrone, José Merseguer:
An approach for the automatic verification of blockchain protocols: the Tweetchain case study. 17-32 - Gianpiero Costantino, Ilaria Matteucci:
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities. 33-49 - Saeed Azizpour, MohammadReza Majma:
NADA: new architecture for detecting DoS and DDoS attacks in fog computing. 51-64 - Alejandro Guerra-Manzanares, Hayretdin Bahsi, Marcin Luckner:
Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection. 65-96 - Alvaro Chysi, Stavros D. Nikolopoulos, Iosif Polenakis:
Detection and classification of malicious software utilizing Max-Flows between system-call groups. 97-123 - Maxim O. Kalinin, Vasiliy M. Krundyshev:
Security intrusion detection using quantum machine learning techniques. 125-136 - Sina Tamjidi, Alireza Shameli-Sendi:
Intelligence in security countermeasures selection. 137-148
Volume 19, Number 2, June 2023
- Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto:
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. 149-163 - Ander Granado Masid, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo:
Application of the SAMA methodology to Ryuk malware. 165-198 - (Withdrawn) Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. 199-215
- Swetha Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, N. Balakrishnan:
XAI for intrusion detection system: comparing explanations based on global and local scope. 217-239 - (Withdrawn) Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM. 241-255
- (Withdrawn) Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. 257-269
- Hashem Hashemi, Mohammad Ebrahim Samie, Ali Hamzeh:
IFMD: image fusion for malware detection. 271-286 - Alireza Sadeghi-Nasab, Vahid Rafe:
A comprehensive review of the security flaws of hashing algorithms. 287-302 - Meysam Ghahramani, Reza Javidan:
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks. 303-317 - Chariton Karamitas, Athanasios Kehagias:
Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study. 319-337
Volume 19, Number 3, September 2023
- Vladimir M. Fomichev, Alisa M. Koreneva:
Editorial special issue: Russian research in cybersecurity. 339-340 - Anna Epishkina, Nikolay Karapetyants, Konstantin Kogos, Philip Lebedev:
Covert channel limitation via special dummy traffic generating. 341-349 - Mark Ermolov, Dmitry Sklyarov, Maxim Goryachy:
Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors. 351-365 - Nina D. Ivanova, Vitaliy G. Ivanenko:
Modeling advanced persistent threats using risk matrix methods. 367-372 - Julia Bobrysheva, Sergey Zapechnikov:
Post-quantum security of messengers: secure group chats and continuous key distribution protocols. 373-380 - Aleksei Kirov, Valerii Sizov:
Development of a method for targeted monitoring and processing of information security incidents of economic entities. 381-386 - G. S. Ponomarenko, P. G. Klyucharev:
On improvements of robustness of obfuscated JavaScript code detection. 387-398 - Evgeniy Y. Pavlenko, K. V. Vasil'eva, Daria S. Lavrova, Dmitry P. Zegzhda:
Counteraction the cybersecurity threats of the in-vehicle local network. 399-408 - Nikolay Karapetyants, Dmitry Efanov:
A practical approach to learning Linux vulnerabilities. 409-418 - Dmitriy Izergin, Mikhail Eremeev, Shamil Magomedov:
Risky model of mobile application presentation. 419-441 - Anatoly Konkin, Sergey Zapechnikov:
Zero knowledge proof and ZK-SNARK for private blockchains. 443-449 - Maria A. Poltavtseva, Elena B. Aleksandrova, Vadim S. Shmatov, Peter D. Zegzhda:
Data protection in heterogeneous big data systems. 451-458 - Anastasia Pereberina, Alexey Kostyushko, Alexander Tormasov:
An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis. 459-468
Volume 19, Number 4, November 2023
- Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour:
An effective intrusion detection approach based on ensemble learning for IIoT edge computing. 469-481 - Yoshihiro Oyama, Hirotaka Kokubo:
Forced continuation of malware execution beyond exceptions. 483-501 - Enrique Soriano-Salvador, Gorka Guardiola Muzquiz:
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation. 503-513 - Mahdi Mahdavi Oliaee, Zahra Ahmadian:
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits. 515-528 - Baijnath Kaushik, Reya Sharma, Kulwant Dhama, Akshma Chadha, Surbhi Sharma:
Performance evaluation of learning models for intrusion detection system using feature selection. 529-548 - Manmeet Singh, Maninder Singh, Sanmeet Kaur:
Identifying bot infection using neural networks on DNS traffic. 549-563 - Leslie F. Sikos, Craig Valli, Alexander E. Grojek, David J. Holmes, Samuel G. Wakeling, Warren Z. Cabral, Nickson M. Karie:
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception. 565-577 - Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp:
Generative adversarial networks and image-based malware classification. 579-595 - Manar Aldaoud, Dawood Al-Abri, Ahmed Al-Maashri, Firdous Kausar:
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach. 597-614 - Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi:
A security vulnerability predictor based on source code metrics. 615-633 - Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. 635
- Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM. 637
- Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. 639
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.