default search action
Journal in Computer Virology, Volume 6
Volume 6, Number 1, February 2010
- Sébastien Tricaud, Philippe Saadé:
Applied parallel coordinates for logs and network traffic attack analysis. 1-29 - Ezzat Kirmani, Cynthia S. Hood:
Analysis of a scanning model of worm propagation. 31-42 - Safaa O. Al-Mamory, Hongli Zhang:
New data mining technique to enhance IDS alarms quality. 43-55 - Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced fuzzing in the VoIP space. 57-64 - Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
Simulating malware with MAlSim. 65-75 - Alexandre Gazet:
Comparative analysis of various ransomware virii. 77-90
Volume 6, Number 2, May 2010
- Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Rokach:
Auto-Sign: an automatic signature generator for high-speed malware filtering devices. 91-103 - Simon Kramer, Julian C. Bradfield:
A general definition of malware. 105-114 - Hazem M. El-Bakry:
Fast virus detection by using high speed time delay neural networks. 115-122 - Eric Uday Kumar:
User-mode memory scanning on 32-bit & 64-bit windows. 123-141 - Frédéric Raynal, François Gaspard:
Small treatise about e-manipulation for honest people. 143-159 - Jose Andre Morales, Peter J. Clarke, Yi Deng:
Identification of file infecting viruses through detection of self-reference replication. 161-180
Volume 6, Number 3, August 2010
- Boris Lau, Vanja Svajcer:
Measuring virtual machine detection in malware using DSD tracer. 181-195 - Patrice Auffret:
SinFP, unification of active and passive operating system fingerprinting. 197-205 - Jean-Baptiste Bedrune, Eric Filiol, Frédéric Raynal:
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis. 207-237 - Asaf Shabtai, Yuval Fledel, Yuval Elovici, Yuval Shahar:
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics. 239-259 - Yoann Guillot, Alexandre Gazet:
Automatic binary deobfuscation. 261-276 - Jean-Marie Borello, Eric Filiol, Ludovic Mé:
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques. 277-287
Volume 6, Number 4, November 2010
- Frédéric Raynal, Guillaume Delugré, Damien Aumaitre:
Malicious origami in PDF. 289-315 - Mikaël Salaün:
Practical overview of a Xen covert channel. 317-328 - Guillaume Prigent, Florian Vichot, Fabrice Harrouet:
IpMorph: fingerprinting spoofing unification. 329-342 - Julien Iguchi-Cartigny, Jean-Louis Lanet:
Developing a Trojan applets in a smart card. 343-351 - Loïc Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin:
ACPI and SMI handlers: some limits to trusted computing. 353-374
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.