default search action
Search dblp for Publications
export results for "toc:db/journals/virology/virology8.bht:"
@article{DBLP:journals/virology/Apvrille12, author = {Axelle Apvrille}, title = {Symbian worm Yxes: towards mobile botnets?}, journal = {J. Comput. Virol.}, volume = {8}, number = {4}, pages = {117--131}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0163-2}, doi = {10.1007/S11416-012-0163-2}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Apvrille12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ApvrilleS12, author = {Axelle Apvrille and Tim Strazzere}, title = {Reducing the window of opportunity for Android malware Gotta catch 'em all}, journal = {J. Comput. Virol.}, volume = {8}, number = {1-2}, pages = {61--71}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0162-3}, doi = {10.1007/S11416-012-0162-3}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ApvrilleS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Aycock12, author = {John Aycock}, title = {What's in a name. . . generator?}, journal = {J. Comput. Virol.}, volume = {8}, number = {1-2}, pages = {53--60}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0161-4}, doi = {10.1007/S11416-012-0161-4}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Aycock12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/CimpoesuGP12, author = {Mihai Cimpoesu and Dragos Gavrilut and Adrian Popescu}, title = {The proactivity of Perceptron derived algorithms in malware detection}, journal = {J. Comput. Virol.}, volume = {8}, number = {4}, pages = {133--140}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0164-1}, doi = {10.1007/S11416-012-0164-1}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/CimpoesuGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/CimpoesuP12, author = {Mihai Cimpoesu and Claudiu Popa}, title = {Dronezilla: designing an accurate malware behavior retrieval system}, journal = {J. Comput. Virol.}, volume = {8}, number = {3}, pages = {109--116}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0170-3}, doi = {10.1007/S11416-012-0170-3}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/CimpoesuP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Deligne12, author = {Eddy Deligne}, title = {ARDrone corruption}, journal = {J. Comput. Virol.}, volume = {8}, number = {1-2}, pages = {15--27}, year = {2012}, url = {https://doi.org/10.1007/s11416-011-0158-4}, doi = {10.1007/S11416-011-0158-4}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Deligne12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/EskandariH12, author = {Mojtaba Eskandari and Sattar Hashemi}, title = {{ECFGM:} enriched control flow graph miner for unknown vicious infected code detection}, journal = {J. Comput. Virol.}, volume = {8}, number = {3}, pages = {99--108}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0169-9}, doi = {10.1007/S11416-012-0169-9}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/EskandariH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Guyot12, author = {Vincent Guyot}, title = {Smart card, the stealth leaker}, journal = {J. Comput. Virol.}, volume = {8}, number = {1-2}, pages = {29--36}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0159-y}, doi = {10.1007/S11416-012-0159-Y}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Guyot12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Issa12, author = {Anoirel Issa}, title = {Anti-virtual machines and emulations}, journal = {J. Comput. Virol.}, volume = {8}, number = {4}, pages = {141--149}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0165-0}, doi = {10.1007/S11416-012-0165-0}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Issa12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MaDLGL12, author = {Weiqin Ma and Pu Duan and Sanmin Liu and Guofei Gu and Jyh{-}Charn Liu}, title = {Shadow attacks: automatically evading system-call-behavior based malware detection}, journal = {J. Comput. Virol.}, volume = {8}, number = {1-2}, pages = {1--13}, year = {2012}, url = {https://doi.org/10.1007/s11416-011-0157-5}, doi = {10.1007/S11416-011-0157-5}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/MaDLGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MilesLW12, author = {Craig Miles and Arun Lakhotia and Andrew Walenstein}, title = {In situ reuse of logically extracted functional components}, journal = {J. Comput. Virol.}, volume = {8}, number = {3}, pages = {73--84}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0167-y}, doi = {10.1007/S11416-012-0167-Y}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/MilesLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RanjithPS12, author = {P. G. Ranjith and Priya Chandran and Shalini Kaleeswaran}, title = {On covert channels between virtual machines}, journal = {J. Comput. Virol.}, volume = {8}, number = {3}, pages = {85--97}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0168-x}, doi = {10.1007/S11416-012-0168-X}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/RanjithPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RunwalLS12, author = {Neha Runwal and Richard M. Low and Mark Stamp}, title = {Opcode graph similarity and metamorphic detection}, journal = {J. Comput. Virol.}, volume = {8}, number = {1-2}, pages = {37--52}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0160-5}, doi = {10.1007/S11416-012-0160-5}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/RunwalLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/VatamanuGB12, author = {Cristina Vatamanu and Dragos Gavrilut and Razvan Benchea}, title = {A practical approach on clustering malicious {PDF} documents}, journal = {J. Comput. Virol.}, volume = {8}, number = {4}, pages = {151--163}, year = {2012}, url = {https://doi.org/10.1007/s11416-012-0166-z}, doi = {10.1007/S11416-012-0166-Z}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/VatamanuGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.