Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/virology/virology4.bht:"
@article{DBLP:journals/virology/AiacheHLT08, author = {Herv{\'{e}} A{\"{\i}}ache and Fran{\c{c}}ois Haettel and Laure Lebrun and C{\'{e}}dric Tavernier}, title = {Improving security and performance of an Ad Hoc network through a multipath routing strategy}, journal = {J. Comput. Virol.}, volume = {4}, number = {4}, pages = {267--278}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0072-y}, doi = {10.1007/S11416-007-0072-Y}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AiacheHLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AlataANOK08, author = {Eric Alata and Ion Alberdi and Vincent Nicomette and Philippe Owezarski and Mohamed Ka{\^{a}}niche}, title = {Internet attacks monitoring with dynamic connection redirection mechanisms}, journal = {J. Comput. Virol.}, volume = {4}, number = {2}, pages = {127--136}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0067-8}, doi = {10.1007/S11416-007-0067-8}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AlataANOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AllamigeonH08, author = {Xavier Allamigeon and Charles Hymans}, title = {Static analysis by abstract interpretation: application to the detection of heap overflows}, journal = {J. Comput. Virol.}, volume = {4}, number = {1}, pages = {5--23}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0063-z}, doi = {10.1007/S11416-007-0063-Z}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AllamigeonH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BarrCM08, author = {Stanley J. Barr and Samuel J. Cardman and David M. Martin}, title = {A boosting ensemble for the recognition of code sharing in malware}, journal = {J. Comput. Virol.}, volume = {4}, number = {4}, pages = {335--345}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0087-z}, doi = {10.1007/S11416-008-0087-Z}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BarrCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BiondiF08, author = {Philippe Biondi and Eric Filiol}, title = {Foreword}, journal = {J. Comput. Virol.}, volume = {4}, number = {1}, pages = {1--3}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0073-x}, doi = {10.1007/S11416-007-0073-X}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BiondiF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BorelloM08, author = {Jean{-}Marie Borello and Ludovic M{\'{e}}}, title = {Code obfuscation techniques for metamorphic viruses}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {211--220}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0084-2}, doi = {10.1007/S11416-008-0084-2}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BorelloM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ButtiT08, author = {Laurent Butti and Julien Tinn{\'{e}}s}, title = {Discovering and exploiting 802.11 wireless driver vulnerabilities}, journal = {J. Comput. Virol.}, volume = {4}, number = {1}, pages = {25--37}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0065-x}, doi = {10.1007/S11416-007-0065-X}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ButtiT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DucK08, author = {Guillaume Duc and Ronan Keryell}, title = {Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection}, journal = {J. Comput. Virol.}, volume = {4}, number = {2}, pages = {101--113}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0062-0}, doi = {10.1007/S11416-007-0062-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/DucK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Duverger08, author = {St{\'{e}}phane Duverger}, title = {Linux 2.6 kernel exploits}, journal = {J. Comput. Virol.}, volume = {4}, number = {1}, pages = {39--60}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0066-9}, doi = {10.1007/S11416-007-0066-9}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Duverger08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/FeilN08, author = {Renaud Feil and Louis Nyffenegger}, title = {Evolution of cross site request forgery attacks}, journal = {J. Comput. Virol.}, volume = {4}, number = {1}, pages = {61--71}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0068-7}, doi = {10.1007/S11416-007-0068-7}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/FeilN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Filiol08, author = {Eric Filiol}, title = {Editorial}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {159--160}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0083-3}, doi = {10.1007/S11416-008-0083-3}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Filiol08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JacobDF08, author = {Gr{\'{e}}goire Jacob and Herv{\'{e}} Debar and Eric Filiol}, title = {Behavioral detection of malware: from a survey towards an established taxonomy}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {251--266}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0086-0}, doi = {10.1007/S11416-008-0086-0}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JacobDF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JacobFD08, author = {Gr{\'{e}}goire Jacob and Eric Filiol and Herv{\'{e}} Debar}, title = {Malware as interaction machines: a new framework for behavior modelling}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {235--250}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0085-1}, doi = {10.1007/S11416-008-0085-1}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JacobFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Johns08, author = {Martin Johns}, title = {On JavaScript Malware and related threats}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {161--178}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0076-7}, doi = {10.1007/S11416-007-0076-7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Johns08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JungMP08, author = {Jaeyeon Jung and Rodolfo A. Milito and Vern Paxson}, title = {On the adaptive real-time detection of fast-propagating network worms}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {197--210}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0080-y}, doi = {10.1007/S11416-007-0080-Y}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/JungMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LacombeRN08, author = {{\'{E}}ric Lacombe and Fr{\'{e}}d{\'{e}}ric Raynal and Vincent Nicomette}, title = {Rootkit modeling and experiments under Linux}, journal = {J. Comput. Virol.}, volume = {4}, number = {2}, pages = {137--157}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0069-6}, doi = {10.1007/S11416-007-0069-6}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LacombeRN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Lagadec08, author = {Philippe Lagadec}, title = {OpenDocument and Open {XML} security (OpenOffice.org and {MS} Office 2007)}, journal = {J. Comput. Virol.}, volume = {4}, number = {2}, pages = {115--125}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0060-2}, doi = {10.1007/S11416-007-0060-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Lagadec08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LouwLV08, author = {Mike Ter Louw and Jin Soon Lim and V. N. Venkatakrishnan}, title = {Enhancing web browser security against malware extensions}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {179--195}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0078-5}, doi = {10.1007/S11416-007-0078-5}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LouwLV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Marechal08, author = {Simon Marechal}, title = {Advances in password cracking}, journal = {J. Comput. Virol.}, volume = {4}, number = {1}, pages = {73--81}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0064-y}, doi = {10.1007/S11416-007-0064-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Marechal08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MoralesCDK08, author = {Jose Andre Morales and Peter J. Clarke and Yi Deng and B. M. Golam Kibria}, title = {Characterization of virus replication}, journal = {J. Comput. Virol.}, volume = {4}, number = {3}, pages = {221--234}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0077-6}, doi = {10.1007/S11416-007-0077-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/MoralesCDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Ruff08, author = {Nicolas Ruff}, title = {Windows memory forensics}, journal = {J. Comput. Virol.}, volume = {4}, number = {2}, pages = {83--100}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0070-0}, doi = {10.1007/S11416-007-0070-0}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Ruff08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SulaimanMS08, author = {Anthonius Sulaiman and Srinivas Mukkamala and Andrew H. Sung}, title = {{SQL} infections through {RFID}}, journal = {J. Comput. Virol.}, volume = {4}, number = {4}, pages = {347--356}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0075-8}, doi = {10.1007/S11416-007-0075-8}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/SulaimanMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/WagenerSD08, author = {G{\'{e}}rard Wagener and Radu State and Alexandre Dulaunoy}, title = {Malware behaviour analysis}, journal = {J. Comput. Virol.}, volume = {4}, number = {4}, pages = {279--287}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0074-9}, doi = {10.1007/S11416-007-0074-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/WagenerSD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/WalensteinMCL08, author = {Andrew Walenstein and Rachit Mathur and Mohamed R. Chouchane and Arun Lakhotia}, title = {Constructing malware normalizers using term rewriting}, journal = {J. Comput. Virol.}, volume = {4}, number = {4}, pages = {307--322}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0081-5}, doi = {10.1007/S11416-008-0081-5}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/WalensteinMCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/WebsterM08, author = {Matt Webster and Grant Malcolm}, title = {Formal affordance-based models of computer virus reproduction}, journal = {J. Comput. Virol.}, volume = {4}, number = {4}, pages = {289--306}, year = {2008}, url = {https://doi.org/10.1007/s11416-007-0079-4}, doi = {10.1007/S11416-007-0079-4}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/WebsterM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/YeWLYJ08, author = {Yanfang Ye and Dingding Wang and Tao Li and Dongyi Ye and Qingshan Jiang}, title = {An intelligent PE-malware detection system based on association mining}, journal = {J. Comput. Virol.}, volume = {4}, number = {4}, pages = {323--334}, year = {2008}, url = {https://doi.org/10.1007/s11416-008-0082-4}, doi = {10.1007/S11416-008-0082-4}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/YeWLYJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.