default search action
Journal in Computer Virology, Volume 2
Volume 2, Number 1, August 2006
- Vlasti Broucek, Eric Filiol, Paul Turner:
Foreword. 1-2 - Vlasti Broucek, Paul Turner:
Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research. 3-12 - Sarah Gordon, Richard Ford:
On the definition and classification of cybercrime. 13-20 - Gerald Tripp:
A Parallel "String Matching Engine" for use in High Speed Network Intrusion Detection Systems. 21-34 - Eric Filiol:
Malware Pattern Scanning Schemes Secure Against Black-box Analysis. 35-50 - Sébastien Josse:
How to Assess the Effectiveness of your Anti-virus? 51-65 - Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda:
Dynamic Analysis of Malicious Code. 67-77 - John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.:
Anti-disassembly using Cryptographic Hash Functions. 79-85 - Baris Kayayurt, Tugkan Tuglular:
End-to-end security implementation for mobile devices using TLS protocol. 87-97
Volume 2, Number 2, November 2006
- Eric Filiol:
Foreword. 99 - Daniel Reynaud-Plantey:
The Java Mobile Risk. 101-107 - Sampo Töyssy, Marko Helenius:
About malicious software in smartphones. 109-119 - Christos Xenakis:
Malicious actions against the GPRS technology. 121-133 - Jose Andre Morales, Peter J. Clarke, Yi Deng, B. M. Golam Kibria:
Testing and evaluating virus detectors for handheld devices. 135-147
Volume 2, Number 3, December 2006
- Matt Webster, Grant Malcolm:
Detection of metamorphic computer viruses using algebraic specification. 149-161 - InSeon Yoo, Ulrich Ultes-Nitsche:
Non-signature based virus detection. 163-186 - David de Drézigué, Jean-Paul Fizaine, Nils Hansma:
In-depth analysis of the viral threats with OpenOffice.org documents. 187-210 - Wing Wong, Mark Stamp:
Hunting for metamorphic engines. 211-229 - Krishna Sandeep Reddy Dubba, Arun K. Pujari:
N-gram analysis for computer virus detection. 231-239
Volume 2, Number 4, February 2007
- Eric Filiol, Roland Büschkes, Pavel Laskov:
Foreword. 241-242 - Konrad Rieck, Pavel Laskov:
Language models for detection of unknown attacks in network traffic. 243-256 - Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Network-level polymorphic shellcode detection using emulation. 257-274 - André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction. 275-289
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.