Search dblp for Publications

export results for "toc:db/journals/virology/virology19.bht:"

 download as .bib file

@article{DBLP:journals/virology/AldaoudAAK23,
  author       = {Manar Aldaoud and
                  Dawood Al{-}Abri and
                  Ahmed Al{-}Maashri and
                  Firdous Kausar},
  title        = {Detecting and mitigating {DHCP} attacks in OpenFlow-based {SDN} networks:
                  a comprehensive approach},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {597--614},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00468-z},
  doi          = {10.1007/S11416-023-00468-Z},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AldaoudAAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AzizpourM23,
  author       = {Saeed Azizpour and
                  MohammadReza Majma},
  title        = {{NADA:} new architecture for detecting DoS and DDoS attacks in fog
                  computing},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {51--64},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00431-4},
  doi          = {10.1007/S11416-022-00431-4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/AzizpourM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BobryshevaZ23,
  author       = {Julia Bobrysheva and
                  Sergey Zapechnikov},
  title        = {Post-quantum security of messengers: secure group chats and continuous
                  key distribution protocols},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {373--380},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00446-x},
  doi          = {10.1007/S11416-022-00446-X},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BobryshevaZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ChysiNP23,
  author       = {Alvaro Chysi and
                  Stavros D. Nikolopoulos and
                  Iosif Polenakis},
  title        = {Detection and classification of malicious software utilizing Max-Flows
                  between system-call groups},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {97--123},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00433-2},
  doi          = {10.1007/S11416-022-00433-2},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ChysiNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/CostantinoM23,
  author       = {Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {33--49},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00430-5},
  doi          = {10.1007/S11416-022-00430-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/CostantinoM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EpishkinaKKL23,
  author       = {Anna Epishkina and
                  Nikolay Karapetyants and
                  Konstantin Kogos and
                  Philip Lebedev},
  title        = {Covert channel limitation via special dummy traffic generating},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {341--349},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00428-z},
  doi          = {10.1007/S11416-022-00428-Z},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/EpishkinaKKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ErmolovSG23,
  author       = {Mark Ermolov and
                  Dmitry Sklyarov and
                  Maxim Goryachy},
  title        = {Undocumented x86 instructions to control the {CPU} at the microarchitecture
                  level in modern Intel processors},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {351--365},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00438-x},
  doi          = {10.1007/S11416-022-00438-X},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ErmolovSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/FomichevK23,
  author       = {Vladimir M. Fomichev and
                  Alisa M. Koreneva},
  title        = {Editorial special issue: Russian research in cybersecurity},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {339--340},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00494-x},
  doi          = {10.1007/S11416-023-00494-X},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/FomichevK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/GhahramaniJ23,
  author       = {Meysam Ghahramani and
                  Reza Javidan},
  title        = {Time dependency: an efficient biometric-based authentication for secure
                  communication in wireless healthcare sensor networks},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {303--317},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00448-9},
  doi          = {10.1007/S11416-022-00448-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/GhahramaniJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/GuerraManzanaresBL23,
  author       = {Alejandro Guerra{-}Manzanares and
                  Hayretdin Bahsi and
                  Marcin Luckner},
  title        = {Leveraging the first line of defense: a study on the evolution and
                  usage of android security permissions for enhanced android malware
                  detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {65--96},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00432-3},
  doi          = {10.1007/S11416-022-00432-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/GuerraManzanaresBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/HangXZGL23a,
  title        = {Retraction Note: Artificial intelligence enabled fuzzy multimode decision
                  support system for cyber threat security defense automation},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {635},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00485-y},
  doi          = {10.1007/S11416-023-00485-Y},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/HangXZGL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/HariharanRPTB23,
  author       = {Swetha Hariharan and
                  R. R. Rejimol Robinson and
                  Rendhir R. Prasad and
                  Ciza Thomas and
                  N. Balakrishnan},
  title        = {{XAI} for intrusion detection system: comparing explanations based
                  on global and local scope},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {217--239},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00441-2},
  doi          = {10.1007/S11416-022-00441-2},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/HariharanRPTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/HashemiSH23,
  author       = {Hashem Hashemi and
                  Mohammad Ebrahim Samie and
                  Ali Hamzeh},
  title        = {{IFMD:} image fusion for malware detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {271--286},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00445-y},
  doi          = {10.1007/S11416-022-00445-Y},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/HashemiSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/IvanovaI23,
  author       = {Nina D. Ivanova and
                  Vitaliy G. Ivanenko},
  title        = {Modeling advanced persistent threats using risk matrix methods},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {367--372},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00440-3},
  doi          = {10.1007/S11416-022-00440-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/IvanovaI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/IzerginEM23,
  author       = {Dmitriy Izergin and
                  Mikhail Eremeev and
                  Shamil Magomedov},
  title        = {Risky model of mobile application presentation},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {419--441},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00461-6},
  doi          = {10.1007/S11416-023-00461-6},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/IzerginEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KalePTS23,
  author       = {Aparna Sunil Kale and
                  Vinay Pandya and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00424-3},
  doi          = {10.1007/S11416-022-00424-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KalePTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KalininK23,
  author       = {Maxim O. Kalinin and
                  Vasiliy M. Krundyshev},
  title        = {Security intrusion detection using quantum machine learning techniques},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {125--136},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00435-0},
  doi          = {10.1007/S11416-022-00435-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KalininK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KaramitasK23,
  author       = {Chariton Karamitas and
                  Athanasios Kehagias},
  title        = {Improving binary diffing speed and accuracy using community detection
                  and locality-sensitive hashing: an empirical study},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {319--337},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00452-z},
  doi          = {10.1007/S11416-022-00452-Z},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KaramitasK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KarapetyantsE23,
  author       = {Nikolay Karapetyants and
                  Dmitry Efanov},
  title        = {A practical approach to learning Linux vulnerabilities},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {409--418},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00455-w},
  doi          = {10.1007/S11416-022-00455-W},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KarapetyantsE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KaushikSDCS23,
  author       = {Baijnath Kaushik and
                  Reya Sharma and
                  Kulwant Dhama and
                  Akshma Chadha and
                  Surbhi Sharma},
  title        = {Performance evaluation of learning models for intrusion detection
                  system using feature selection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {529--548},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00460-z},
  doi          = {10.1007/S11416-022-00460-Z},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KaushikSDCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KirovS23,
  author       = {Aleksei Kirov and
                  Valerii Sizov},
  title        = {Development of a method for targeted monitoring and processing of
                  information security incidents of economic entities},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {381--386},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00449-8},
  doi          = {10.1007/S11416-022-00449-8},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KirovS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KonkinZ23,
  author       = {Anatoly Konkin and
                  Sergey Zapechnikov},
  title        = {Zero knowledge proof and {ZK-SNARK} for private blockchains},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {443--449},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00466-1},
  doi          = {10.1007/S11416-023-00466-1},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KonkinZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MasidHHM23,
  author       = {Ander Granado Masid and
                  Javier Bermejo Higuera and
                  Juan Ram{\'{o}}n Bermejo Higuera and
                  Juan Antonio Sicilia Montalvo},
  title        = {Application of the {SAMA} methodology to Ryuk malware},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {165--198},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00434-1},
  doi          = {10.1007/S11416-022-00434-1},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/MasidHHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MohyEddineGBA23,
  author       = {Mouaad Mohy{-}Eddine and
                  Azidine Guezzaz and
                  Said Benkirane and
                  Mourade Azrour},
  title        = {An effective intrusion detection approach based on ensemble learning
                  for IIoT edge computing},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {469--481},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00456-9},
  doi          = {10.1007/S11416-022-00456-9},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/MohyEddineGBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/NguyenTIS23,
  author       = {Huy Nguyen and
                  Fabio Di Troia and
                  Genya Ishigaki and
                  Mark Stamp},
  title        = {Generative adversarial networks and image-based malware classification},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {579--595},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00465-2},
  doi          = {10.1007/S11416-023-00465-2},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/NguyenTIS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/OliaeeA23,
  author       = {Mahdi Mahdavi Oliaee and
                  Zahra Ahmadian},
  title        = {Fine-grained flexible access control: ciphertext policy attribute
                  based encryption for arithmetic circuits},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {515--528},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00459-6},
  doi          = {10.1007/S11416-022-00459-6},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/OliaeeA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/OyamaK23,
  author       = {Yoshihiro Oyama and
                  Hirotaka Kokubo},
  title        = {Forced continuation of malware execution beyond exceptions},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {483--501},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00457-8},
  doi          = {10.1007/S11416-022-00457-8},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/OyamaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PakshadSA23,
  author       = {Puya Pakshad and
                  Alireza Shameli{-}Sendi and
                  Behzad Khalaji Emamzadeh Abbasi},
  title        = {A security vulnerability predictor based on source code metrics},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {615--633},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00469-y},
  doi          = {10.1007/S11416-023-00469-Y},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/PakshadSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PavlenkoVLZ23,
  author       = {Evgeniy Y. Pavlenko and
                  K. V. Vasil'eva and
                  Daria S. Lavrova and
                  Dmitry P. Zegzhda},
  title        = {Counteraction the cybersecurity threats of the in-vehicle local network},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {399--408},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00451-0},
  doi          = {10.1007/S11416-022-00451-0},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/PavlenkoVLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PereberinaKT23,
  author       = {Anastasia Pereberina and
                  Alexey Kostyushko and
                  Alexander Tormasov},
  title        = {An algorithm for scheduling of threads for system and application
                  code split approach in dynamic malware analysis},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {459--468},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00473-2},
  doi          = {10.1007/S11416-023-00473-2},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/PereberinaKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PoltavtsevaASZ23,
  author       = {Maria A. Poltavtseva and
                  Elena B. Aleksandrova and
                  Vadim S. Shmatov and
                  Peter D. Zegzhda},
  title        = {Data protection in heterogeneous big data systems},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {451--458},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00472-3},
  doi          = {10.1007/S11416-023-00472-3},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/PoltavtsevaASZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PonomarenkoK23,
  author       = {G. S. Ponomarenko and
                  P. G. Klyucharev},
  title        = {On improvements of robustness of obfuscated JavaScript code detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {3},
  pages        = {387--398},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00450-1},
  doi          = {10.1007/S11416-022-00450-1},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/PonomarenkoK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RaimondoBMM23,
  author       = {Mariapia Raimondo and
                  Simona Bernardi and
                  Stefano Marrone and
                  Jos{\'{e}} Merseguer},
  title        = {An approach for the automatic verification of blockchain protocols:
                  the Tweetchain case study},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {17--32},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00444-z},
  doi          = {10.1007/S11416-022-00444-Z},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/RaimondoBMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RaoMD23a,
  title        = {Retraction Note: Joint detection and classification of signature and
                  NetFlow based internet worms using MBGWO-based hybrid {LSTM}},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {637},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00487-w},
  doi          = {10.1007/S11416-023-00487-W},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/RaoMD23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SadeghiNasabR23,
  author       = {Alireza Sadeghi{-}Nasab and
                  Vahid Rafe},
  title        = {A comprehensive review of the security flaws of hashing algorithms},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {287--302},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00447-w},
  doi          = {10.1007/S11416-022-00447-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/SadeghiNasabR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SikosVGHWCK23,
  author       = {Leslie F. Sikos and
                  Craig Valli and
                  Alexander E. Grojek and
                  David J. Holmes and
                  Samuel G. Wakeling and
                  Warren Z. Cabral and
                  Nickson M. Karie},
  title        = {CamDec: Advancing Axis {P1435-LE} video camera security using honeypot-based
                  deception},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {565--577},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00463-4},
  doi          = {10.1007/S11416-023-00463-4},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/SikosVGHWCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SinghSK23,
  author       = {Manmeet Singh and
                  Maninder Singh and
                  Sanmeet Kaur},
  title        = {Identifying bot infection using neural networks on {DNS} traffic},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {549--563},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00462-5},
  doi          = {10.1007/S11416-023-00462-5},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/SinghSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SorianoSalvadorM23,
  author       = {Enrique Soriano{-}Salvador and
                  Gorka Guardiola Muzquiz},
  title        = {Detecting and bypassing frida dynamic function call tracing: exploitation
                  and mitigation},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {503--513},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00458-7},
  doi          = {10.1007/S11416-022-00458-7},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/SorianoSalvadorM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/TamjidiS23,
  author       = {Sina Tamjidi and
                  Alireza Shameli{-}Sendi},
  title        = {Intelligence in security countermeasures selection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {1},
  pages        = {137--148},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-022-00439-w},
  doi          = {10.1007/S11416-022-00439-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/TamjidiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/YonamineTKM23,
  author       = {Shun Yonamine and
                  Yuzo Taenaka and
                  Youki Kadobayashi and
                  Daisuke Miyamoto},
  title        = {Design and implementation of a sandbox for facilitating and automating
                  IoT malware analysis with techniques to elicit malicious behavior:
                  case studies of functionalities for dissecting IoT malware},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {149--163},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00478-x},
  doi          = {10.1007/S11416-023-00478-X},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/YonamineTKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Zhang23a,
  title        = {Retraction Note: Artificial intelligence assisted cyber threat assessment
                  and applications for the tourism industry},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {639},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00490-1},
  doi          = {10.1007/S11416-023-00490-1},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Zhang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/HangXZGL23,
  title        = {Artificial intelligence enabled fuzzy multimode decision support system
                  for cyber threat security defense automation},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {257--269},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s11416-022-00443-0},
  doi          = {10.1007/S11416-022-00443-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/HangXZGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RaoMD23,
  title        = {Joint detection and classification of signature and NetFlow based
                  internet worms using MBGWO-based hybrid {LSTM}},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {241--255},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s11416-022-00442-1},
  doi          = {10.1007/S11416-022-00442-1},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/RaoMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Zhang23,
  title        = {Artificial intelligence assisted cyber threat assessment and applications
                  for the tourism industry},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {2},
  pages        = {199--215},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s11416-022-00436-z},
  doi          = {10.1007/S11416-022-00436-Z},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}