- Maria A. Poltavtseva
, Elena B. Aleksandrova
, Vadim S. Shmatov
, Peter D. Zegzhda
:
Data protection in heterogeneous big data systems. J. Comput. Virol. Hacking Tech. 19(3): 451-458 (2023) - G. S. Ponomarenko
, P. G. Klyucharev
:
On improvements of robustness of obfuscated JavaScript code detection. J. Comput. Virol. Hacking Tech. 19(3): 387-398 (2023) - Mariapia Raimondo, Simona Bernardi, Stefano Marrone
, José Merseguer:
An approach for the automatic verification of blockchain protocols: the Tweetchain case study. J. Comput. Virol. Hacking Tech. 19(1): 17-32 (2023) - Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM. J. Comput. Virol. Hacking Tech. 19(4): 637 (2023)
- Alireza Sadeghi-Nasab
, Vahid Rafe
:
A comprehensive review of the security flaws of hashing algorithms. J. Comput. Virol. Hacking Tech. 19(2): 287-302 (2023) - Leslie F. Sikos
, Craig Valli
, Alexander E. Grojek
, David J. Holmes
, Samuel G. Wakeling
, Warren Z. Cabral
, Nickson M. Karie
:
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception. J. Comput. Virol. Hacking Tech. 19(4): 565-577 (2023) - Manmeet Singh
, Maninder Singh, Sanmeet Kaur
:
Identifying bot infection using neural networks on DNS traffic. J. Comput. Virol. Hacking Tech. 19(4): 549-563 (2023) - Enrique Soriano-Salvador
, Gorka Guardiola Muzquiz
:
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation. J. Comput. Virol. Hacking Tech. 19(4): 503-513 (2023) - Sina Tamjidi, Alireza Shameli-Sendi
:
Intelligence in security countermeasures selection. J. Comput. Virol. Hacking Tech. 19(1): 137-148 (2023) - Shun Yonamine
, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto:
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. J. Comput. Virol. Hacking Tech. 19(2): 149-163 (2023) - Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. J. Comput. Virol. Hacking Tech. 19(4): 639 (2023)
- (Withdrawn) Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. J. Comput. Virol. Hacking Tech. 19(2): 257-269 (2023)
- (Withdrawn) Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM. J. Comput. Virol. Hacking Tech. 19(2): 241-255 (2023)
- (Withdrawn) Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. J. Comput. Virol. Hacking Tech. 19(2): 199-215 (2023)