


default search action
Search dblp for Publications
export results for "toc:db/journals/virology/virology19.bht:"
@article{DBLP:journals/virology/AldaoudAAK23, author = {Manar Aldaoud and Dawood Al{-}Abri and Ahmed Al{-}Maashri and Firdous Kausar}, title = {Detecting and mitigating {DHCP} attacks in OpenFlow-based {SDN} networks: a comprehensive approach}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {597--614}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00468-z}, doi = {10.1007/S11416-023-00468-Z}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AldaoudAAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AzizpourM23, author = {Saeed Azizpour and MohammadReza Majma}, title = {{NADA:} new architecture for detecting DoS and DDoS attacks in fog computing}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {51--64}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00431-4}, doi = {10.1007/S11416-022-00431-4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/AzizpourM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BobryshevaZ23, author = {Julia Bobrysheva and Sergey Zapechnikov}, title = {Post-quantum security of messengers: secure group chats and continuous key distribution protocols}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {373--380}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00446-x}, doi = {10.1007/S11416-022-00446-X}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BobryshevaZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ChysiNP23, author = {Alvaro Chysi and Stavros D. Nikolopoulos and Iosif Polenakis}, title = {Detection and classification of malicious software utilizing Max-Flows between system-call groups}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {97--123}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00433-2}, doi = {10.1007/S11416-022-00433-2}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ChysiNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/CostantinoM23, author = {Gianpiero Costantino and Ilaria Matteucci}, title = {Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {33--49}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00430-5}, doi = {10.1007/S11416-022-00430-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/CostantinoM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/EpishkinaKKL23, author = {Anna Epishkina and Nikolay Karapetyants and Konstantin Kogos and Philip Lebedev}, title = {Covert channel limitation via special dummy traffic generating}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {341--349}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00428-z}, doi = {10.1007/S11416-022-00428-Z}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/EpishkinaKKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ErmolovSG23, author = {Mark Ermolov and Dmitry Sklyarov and Maxim Goryachy}, title = {Undocumented x86 instructions to control the {CPU} at the microarchitecture level in modern Intel processors}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {351--365}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00438-x}, doi = {10.1007/S11416-022-00438-X}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ErmolovSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/FomichevK23, author = {Vladimir M. Fomichev and Alisa M. Koreneva}, title = {Editorial special issue: Russian research in cybersecurity}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {339--340}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00494-x}, doi = {10.1007/S11416-023-00494-X}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/FomichevK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/GhahramaniJ23, author = {Meysam Ghahramani and Reza Javidan}, title = {Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {303--317}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00448-9}, doi = {10.1007/S11416-022-00448-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/GhahramaniJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/GuerraManzanaresBL23, author = {Alejandro Guerra{-}Manzanares and Hayretdin Bahsi and Marcin Luckner}, title = {Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {65--96}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00432-3}, doi = {10.1007/S11416-022-00432-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/GuerraManzanaresBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/HangXZGL23a, title = {Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {635}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00485-y}, doi = {10.1007/S11416-023-00485-Y}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/HangXZGL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/HariharanRPTB23, author = {Swetha Hariharan and R. R. Rejimol Robinson and Rendhir R. Prasad and Ciza Thomas and N. Balakrishnan}, title = {{XAI} for intrusion detection system: comparing explanations based on global and local scope}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {217--239}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00441-2}, doi = {10.1007/S11416-022-00441-2}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/HariharanRPTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/HashemiSH23, author = {Hashem Hashemi and Mohammad Ebrahim Samie and Ali Hamzeh}, title = {{IFMD:} image fusion for malware detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {271--286}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00445-y}, doi = {10.1007/S11416-022-00445-Y}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/HashemiSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/IvanovaI23, author = {Nina D. Ivanova and Vitaliy G. Ivanenko}, title = {Modeling advanced persistent threats using risk matrix methods}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {367--372}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00440-3}, doi = {10.1007/S11416-022-00440-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/IvanovaI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/IzerginEM23, author = {Dmitriy Izergin and Mikhail Eremeev and Shamil Magomedov}, title = {Risky model of mobile application presentation}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {419--441}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00461-6}, doi = {10.1007/S11416-023-00461-6}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/IzerginEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KalePTS23, author = {Aparna Sunil Kale and Vinay Pandya and Fabio Di Troia and Mark Stamp}, title = {Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00424-3}, doi = {10.1007/S11416-022-00424-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KalePTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KalininK23, author = {Maxim O. Kalinin and Vasiliy M. Krundyshev}, title = {Security intrusion detection using quantum machine learning techniques}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {125--136}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00435-0}, doi = {10.1007/S11416-022-00435-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KalininK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KaramitasK23, author = {Chariton Karamitas and Athanasios Kehagias}, title = {Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {319--337}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00452-z}, doi = {10.1007/S11416-022-00452-Z}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KaramitasK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KarapetyantsE23, author = {Nikolay Karapetyants and Dmitry Efanov}, title = {A practical approach to learning Linux vulnerabilities}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {409--418}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00455-w}, doi = {10.1007/S11416-022-00455-W}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KarapetyantsE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KaushikSDCS23, author = {Baijnath Kaushik and Reya Sharma and Kulwant Dhama and Akshma Chadha and Surbhi Sharma}, title = {Performance evaluation of learning models for intrusion detection system using feature selection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {529--548}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00460-z}, doi = {10.1007/S11416-022-00460-Z}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KaushikSDCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KirovS23, author = {Aleksei Kirov and Valerii Sizov}, title = {Development of a method for targeted monitoring and processing of information security incidents of economic entities}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {381--386}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00449-8}, doi = {10.1007/S11416-022-00449-8}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KirovS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KonkinZ23, author = {Anatoly Konkin and Sergey Zapechnikov}, title = {Zero knowledge proof and {ZK-SNARK} for private blockchains}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {443--449}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00466-1}, doi = {10.1007/S11416-023-00466-1}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KonkinZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MasidHHM23, author = {Ander Granado Masid and Javier Bermejo Higuera and Juan Ram{\'{o}}n Bermejo Higuera and Juan Antonio Sicilia Montalvo}, title = {Application of the {SAMA} methodology to Ryuk malware}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {165--198}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00434-1}, doi = {10.1007/S11416-022-00434-1}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/MasidHHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MohyEddineGBA23, author = {Mouaad Mohy{-}Eddine and Azidine Guezzaz and Said Benkirane and Mourade Azrour}, title = {An effective intrusion detection approach based on ensemble learning for IIoT edge computing}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {469--481}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00456-9}, doi = {10.1007/S11416-022-00456-9}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/MohyEddineGBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/NguyenTIS23, author = {Huy Nguyen and Fabio Di Troia and Genya Ishigaki and Mark Stamp}, title = {Generative adversarial networks and image-based malware classification}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {579--595}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00465-2}, doi = {10.1007/S11416-023-00465-2}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/NguyenTIS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/OliaeeA23, author = {Mahdi Mahdavi Oliaee and Zahra Ahmadian}, title = {Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {515--528}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00459-6}, doi = {10.1007/S11416-022-00459-6}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/OliaeeA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/OyamaK23, author = {Yoshihiro Oyama and Hirotaka Kokubo}, title = {Forced continuation of malware execution beyond exceptions}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {483--501}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00457-8}, doi = {10.1007/S11416-022-00457-8}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/OyamaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PakshadSA23, author = {Puya Pakshad and Alireza Shameli{-}Sendi and Behzad Khalaji Emamzadeh Abbasi}, title = {A security vulnerability predictor based on source code metrics}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {615--633}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00469-y}, doi = {10.1007/S11416-023-00469-Y}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/PakshadSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PavlenkoVLZ23, author = {Evgeniy Y. Pavlenko and K. V. Vasil'eva and Daria S. Lavrova and Dmitry P. Zegzhda}, title = {Counteraction the cybersecurity threats of the in-vehicle local network}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {399--408}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00451-0}, doi = {10.1007/S11416-022-00451-0}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/PavlenkoVLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PereberinaKT23, author = {Anastasia Pereberina and Alexey Kostyushko and Alexander Tormasov}, title = {An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {459--468}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00473-2}, doi = {10.1007/S11416-023-00473-2}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/PereberinaKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PoltavtsevaASZ23, author = {Maria A. Poltavtseva and Elena B. Aleksandrova and Vadim S. Shmatov and Peter D. Zegzhda}, title = {Data protection in heterogeneous big data systems}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {451--458}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00472-3}, doi = {10.1007/S11416-023-00472-3}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/PoltavtsevaASZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PonomarenkoK23, author = {G. S. Ponomarenko and P. G. Klyucharev}, title = {On improvements of robustness of obfuscated JavaScript code detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {3}, pages = {387--398}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00450-1}, doi = {10.1007/S11416-022-00450-1}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/PonomarenkoK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RaimondoBMM23, author = {Mariapia Raimondo and Simona Bernardi and Stefano Marrone and Jos{\'{e}} Merseguer}, title = {An approach for the automatic verification of blockchain protocols: the Tweetchain case study}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {17--32}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00444-z}, doi = {10.1007/S11416-022-00444-Z}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/RaimondoBMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RaoMD23a, title = {Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid {LSTM}}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {637}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00487-w}, doi = {10.1007/S11416-023-00487-W}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/RaoMD23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SadeghiNasabR23, author = {Alireza Sadeghi{-}Nasab and Vahid Rafe}, title = {A comprehensive review of the security flaws of hashing algorithms}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {287--302}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00447-w}, doi = {10.1007/S11416-022-00447-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/SadeghiNasabR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SikosVGHWCK23, author = {Leslie F. Sikos and Craig Valli and Alexander E. Grojek and David J. Holmes and Samuel G. Wakeling and Warren Z. Cabral and Nickson M. Karie}, title = {CamDec: Advancing Axis {P1435-LE} video camera security using honeypot-based deception}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {565--577}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00463-4}, doi = {10.1007/S11416-023-00463-4}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/SikosVGHWCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SinghSK23, author = {Manmeet Singh and Maninder Singh and Sanmeet Kaur}, title = {Identifying bot infection using neural networks on {DNS} traffic}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {549--563}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00462-5}, doi = {10.1007/S11416-023-00462-5}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/SinghSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SorianoSalvadorM23, author = {Enrique Soriano{-}Salvador and Gorka Guardiola Muzquiz}, title = {Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {503--513}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00458-7}, doi = {10.1007/S11416-022-00458-7}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/SorianoSalvadorM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/TamjidiS23, author = {Sina Tamjidi and Alireza Shameli{-}Sendi}, title = {Intelligence in security countermeasures selection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {1}, pages = {137--148}, year = {2023}, url = {https://doi.org/10.1007/s11416-022-00439-w}, doi = {10.1007/S11416-022-00439-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/TamjidiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/YonamineTKM23, author = {Shun Yonamine and Yuzo Taenaka and Youki Kadobayashi and Daisuke Miyamoto}, title = {Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {149--163}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00478-x}, doi = {10.1007/S11416-023-00478-X}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/YonamineTKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Zhang23a, title = {Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {639}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00490-1}, doi = {10.1007/S11416-023-00490-1}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Zhang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/HangXZGL23, title = {Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {257--269}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s11416-022-00443-0}, doi = {10.1007/S11416-022-00443-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/HangXZGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RaoMD23, title = {Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid {LSTM}}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {241--255}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s11416-022-00442-1}, doi = {10.1007/S11416-022-00442-1}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/RaoMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Zhang23, title = {Artificial intelligence assisted cyber threat assessment and applications for the tourism industry}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {2}, pages = {199--215}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s11416-022-00436-z}, doi = {10.1007/S11416-022-00436-Z}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.