default search action
Journal in Computer Virology, Volume 8
Volume 8, Numbers 1-2, May 2012
- Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu:
Shadow attacks: automatically evading system-call-behavior based malware detection. 1-13 - Eddy Deligne:
ARDrone corruption. 15-27 - Vincent Guyot:
Smart card, the stealth leaker. 29-36 - Neha Runwal, Richard M. Low, Mark Stamp:
Opcode graph similarity and metamorphic detection. 37-52 - John Aycock:
What's in a name. . . generator? 53-60 - Axelle Apvrille, Tim Strazzere:
Reducing the window of opportunity for Android malware Gotta catch 'em all. 61-71
Volume 8, Number 3, August 2012
- Craig Miles, Arun Lakhotia, Andrew Walenstein:
In situ reuse of logically extracted functional components. 73-84 - P. G. Ranjith, Priya Chandran, Shalini Kaleeswaran:
On covert channels between virtual machines. 85-97 - Mojtaba Eskandari, Sattar Hashemi:
ECFGM: enriched control flow graph miner for unknown vicious infected code detection. 99-108 - Mihai Cimpoesu, Claudiu Popa:
Dronezilla: designing an accurate malware behavior retrieval system. 109-116
Volume 8, Number 4, November 2012
- Axelle Apvrille:
Symbian worm Yxes: towards mobile botnets? 117-131 - Mihai Cimpoesu, Dragos Gavrilut, Adrian Popescu:
The proactivity of Perceptron derived algorithms in malware detection. 133-140 - Anoirel Issa:
Anti-virtual machines and emulations. 141-149 - Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea:
A practical approach on clustering malicious PDF documents. 151-163
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.