default search action
Journal in Computer Virology, Volume 5
Volume 5, Number 1, February 2009
- Daniel Bilar, Eric Filiol:
Editors/translators Foreword. 1-3 - Jürgen Kraus:
Vorwort. 5-6 - Jürgen Kraus:
Foreword. 7-8 - Jürgen Kraus:
On self-reproducing computer programs. 9-87
Volume 5, Number 2, May 2009
- Ulrich Flegel, Eric Filiol:
Editorial. 89 - Loïc Duflot:
CPU bugs, CPU backdoors and consequences on security. 91-104 - Damien Aumaitre:
A little journey inside Windows memory. 105-117 - Yoann Guillot, Alexandre Gazet:
Semi-automatic binary protection tampering. 119-149 - Srilatha Attaluri, Scott McGhee, Mark Stamp:
Profile hidden Markov models and metamorphic virus detection. 151-169
Volume 5, Number 3, August 2009
- Mehdi Talbi, Mohamed Mejri, Adel Bouhoula:
Specification and evaluation of polymorphic shellcode properties using a new temporal logic. 171-186 - Madhu K. Shankarapani, Anthonius Sulaiman, Srinivas Mukkamala:
Fragmented malware through RFID and its defenses. 187-198 - Pavel V. Zbitskiy:
Code mutation techniques by means of formal grammars and automatons. 199-207 - Philippe Beaucamps:
Extended recursion-based formalization of virus mutation. 209-219 - Matt Webster, Grant Malcolm:
Detection of metamorphic and virtualization-based malware using algebraic specification. 221-245 - Grégoire Jacob, Eric Filiol, Hervé Debar:
Functional polymorphic engines: formalisation, implementation and use cases. 247-261 - Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion:
Architecture of a morphological malware detector. 263-270
Volume 5, Number 4, November 2009
- Safaa O. Al-Mamory, Hongli Zhang:
IDS alerts correlation using grammar-based approach. 271-282 - Yanfang Ye, Lifei Chen, Dingding Wang, Tao Li, Qingshan Jiang, Min Zhao:
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. 283-293 - Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz, Yuval Elovici:
Unknown malcode detection and the imbalance problem. 295-308 - Duc T. Ha, Hung Q. Ngo:
On the trade-off between speed and resiliency of Flash worms and similar malcodes. 309-320 - Sébastien Josse:
White-box attack context cryptovirology. 321-334 - Matthew Hayes, Andrew Walenstein, Arun Lakhotia:
Evaluation of malware phylogeny modelling systems using automated variant generation. 335-343 - Katherine Hoffman, Attila Ondi, Richard Ford, Marco M. Carvalho, Derek Brown, William H. Allen, Gerald A. Marin:
Danger theory and collaborative filtering in MANETs. 345-355 - Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
Treating scalability and modelling human countermeasures against local preference worms via gradient models. 357-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.