default search action
Journal of Computer Virology and Hacking Techniques, Volume 9
Volume 9, Number 1, February 2013
- Annie H. Toderici, Mark Stamp:
Chi-squared distance and metamorphic virus detection. 1-14 - François Goichon, Guillaume Salagnac, Pierre Parrend, Stéphane Frénot:
Static vulnerability detection in Java service-oriented components. 15-26 - Vlasti Broucek, Paul Turner:
Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective. 27-33 - Ming Xu, Lingfei Wu, Shuhui Qi, Jian Xu, Haiping Zhang, Yizhi Ren, Ning Zheng:
A similarity metric method of obfuscated malware using function-call graph. 35-47
Volume 9, Number 2, May 2013
- Sudarshan Madenur Sridhara, Mark Stamp:
Metamorphic worm that carries its own morphing engine. 49-58 - Arnim Eijkhoudt, Tristan Suerink:
Uforia: Universal forensic indexer and analyzer. 59-63 - Valentin Hamon:
Malicious URI resolving in PDF documents. 65-76 - Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi:
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection. 77-93 - Baptiste David, Dorian Larget, Thibaut Scherrer:
The security of databases: the Access case. 95-107
Volume 9, Number 3, August 2013
- Arun Lakhotia, Andrew Walenstein, Craig Miles, Anshuman Singh:
VILO: a rapid learning nearest-neighbor classifier for malware triage. 109-123 - Jonathan Dechaux:
The Office Demon: Minos. 125-135 - Radhouane Chouchane, Natalia Stakhanova, Andrew Walenstein, Arun Lakhotia:
Detecting machine-morphed malware variants via engine attribution. 137-157 - Gayathri Shanmugam, Richard M. Low, Mark Stamp:
Simple substitution distance and metamorphic detection. 159-170
Volume 9, Number 4, November 2013
- Marius Barat, Dumitru-Bogdan Prelipcean, Dragos Teodor Gavrilut:
A study on common malware families evolution in 2012. 171-178 - Donabelle Baysa, Richard M. Low, Mark Stamp:
Structural entropy and metamorphic malware. 179-192 - Ying Cao, Qiguang Miao, Jiachen Liu, Lin Gao:
Abstracting minimal security-relevant behaviors for malware analysis. 193-204 - Cristina Vatamanu, Dragos Gavrilut, Razvan-Mihai Benchea:
Building a practical and reliable classifier for malware detection. 205-214
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.