Search dblp for Publications

export results for "toc:db/journals/virology/virology8.bht:"

 download as .bib file

@article{DBLP:journals/virology/Apvrille12,
  author       = {Axelle Apvrille},
  title        = {Symbian worm Yxes: towards mobile botnets?},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {4},
  pages        = {117--131},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0163-2},
  doi          = {10.1007/S11416-012-0163-2},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Apvrille12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ApvrilleS12,
  author       = {Axelle Apvrille and
                  Tim Strazzere},
  title        = {Reducing the window of opportunity for Android malware Gotta catch
                  'em all},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {1-2},
  pages        = {61--71},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0162-3},
  doi          = {10.1007/S11416-012-0162-3},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ApvrilleS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Aycock12,
  author       = {John Aycock},
  title        = {What's in a name. . . generator?},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {1-2},
  pages        = {53--60},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0161-4},
  doi          = {10.1007/S11416-012-0161-4},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Aycock12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/CimpoesuGP12,
  author       = {Mihai Cimpoesu and
                  Dragos Gavrilut and
                  Adrian Popescu},
  title        = {The proactivity of Perceptron derived algorithms in malware detection},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {4},
  pages        = {133--140},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0164-1},
  doi          = {10.1007/S11416-012-0164-1},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/CimpoesuGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/CimpoesuP12,
  author       = {Mihai Cimpoesu and
                  Claudiu Popa},
  title        = {Dronezilla: designing an accurate malware behavior retrieval system},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {3},
  pages        = {109--116},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0170-3},
  doi          = {10.1007/S11416-012-0170-3},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/CimpoesuP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Deligne12,
  author       = {Eddy Deligne},
  title        = {ARDrone corruption},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {1-2},
  pages        = {15--27},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-011-0158-4},
  doi          = {10.1007/S11416-011-0158-4},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Deligne12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EskandariH12,
  author       = {Mojtaba Eskandari and
                  Sattar Hashemi},
  title        = {{ECFGM:} enriched control flow graph miner for unknown vicious infected
                  code detection},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {3},
  pages        = {99--108},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0169-9},
  doi          = {10.1007/S11416-012-0169-9},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/EskandariH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Guyot12,
  author       = {Vincent Guyot},
  title        = {Smart card, the stealth leaker},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {1-2},
  pages        = {29--36},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0159-y},
  doi          = {10.1007/S11416-012-0159-Y},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Guyot12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Issa12,
  author       = {Anoirel Issa},
  title        = {Anti-virtual machines and emulations},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {4},
  pages        = {141--149},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0165-0},
  doi          = {10.1007/S11416-012-0165-0},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Issa12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MaDLGL12,
  author       = {Weiqin Ma and
                  Pu Duan and
                  Sanmin Liu and
                  Guofei Gu and
                  Jyh{-}Charn Liu},
  title        = {Shadow attacks: automatically evading system-call-behavior based malware
                  detection},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {1-2},
  pages        = {1--13},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-011-0157-5},
  doi          = {10.1007/S11416-011-0157-5},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/MaDLGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MilesLW12,
  author       = {Craig Miles and
                  Arun Lakhotia and
                  Andrew Walenstein},
  title        = {In situ reuse of logically extracted functional components},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {3},
  pages        = {73--84},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0167-y},
  doi          = {10.1007/S11416-012-0167-Y},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/MilesLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RanjithPS12,
  author       = {P. G. Ranjith and
                  Priya Chandran and
                  Shalini Kaleeswaran},
  title        = {On covert channels between virtual machines},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {3},
  pages        = {85--97},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0168-x},
  doi          = {10.1007/S11416-012-0168-X},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/RanjithPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RunwalLS12,
  author       = {Neha Runwal and
                  Richard M. Low and
                  Mark Stamp},
  title        = {Opcode graph similarity and metamorphic detection},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {1-2},
  pages        = {37--52},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0160-5},
  doi          = {10.1007/S11416-012-0160-5},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/RunwalLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/VatamanuGB12,
  author       = {Cristina Vatamanu and
                  Dragos Gavrilut and
                  Razvan Benchea},
  title        = {A practical approach on clustering malicious {PDF} documents},
  journal      = {J. Comput. Virol.},
  volume       = {8},
  number       = {4},
  pages        = {151--163},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11416-012-0166-z},
  doi          = {10.1007/S11416-012-0166-Z},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/VatamanuGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}