default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 22 matches
- 2018
- Blake Anderson, Subharthi Paul, David A. McGrew:
Deciphering malware's use of TLS (without decryption). J. Comput. Virol. Hacking Tech. 14(3): 195-211 (2018) - Annapurna Annadatha, Mark Stamp:
Image spam analysis and detection. J. Comput. Virol. Hacking Tech. 14(1): 39-52 (2018) - Ayesha Binte Ashfaq, Zainab Abaid, Maliha Ismail, Muhammad Umar Aslam, Affan A. Syed, Syed Ali Khayam:
Diagnosing bot infections using Bayesian inference. J. Comput. Virol. Hacking Tech. 14(1): 21-38 (2018) - Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, Maurizio Palmieri:
Verifying data secure flow in AUTOSAR models. J. Comput. Virol. Hacking Tech. 14(4): 269-289 (2018) - Jorge Blasco, Thomas M. Chen:
Automated generation of colluding apps for experimental research. J. Comput. Virol. Hacking Tech. 14(2): 127-138 (2018) - Marcus Botacin, Paulo Lício de Geus, André Ricardo Abed Grégio:
The other guys: automated analysis of marginalized malware. J. Comput. Virol. Hacking Tech. 14(1): 87-98 (2018) - Suchita Deshmukh, Fabio Di Troia, Mark Stamp:
Vigenère scores for malware detection. J. Comput. Virol. Hacking Tech. 14(2): 157-165 (2018) - Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
State of the art of network protocol reverse engineering tools. J. Comput. Virol. Hacking Tech. 14(1): 53-68 (2018) - Paul Irolla, Alexandre Dey:
The duplication issue within the Drebin dataset. J. Comput. Virol. Hacking Tech. 14(3): 245-249 (2018) - A. V. Kozachok, V. I. Kozachok:
Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis. J. Comput. Virol. Hacking Tech. 14(3): 225-231 (2018) - Catalin-Valeriu Lita, Doina Cosovan, Dragos Gavrilut:
Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. J. Comput. Virol. Hacking Tech. 14(2): 107-126 (2018) - Robert Luh, Gregor Schramm, Markus Wagner, Helge Janicke, Sebastian Schrittwieser:
SEQUIN: a grammar inference framework for analyzing malicious system behavior. J. Comput. Virol. Hacking Tech. 14(4): 291-311 (2018) - Yoshihiro Oyama:
Trends of anti-analysis operations of malwares observed in API call logs. J. Comput. Virol. Hacking Tech. 14(1): 69-85 (2018) - Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
Intelligent OS X malware threat detection with code inspection. J. Comput. Virol. Hacking Tech. 14(3): 213-223 (2018) - Yeon-jin Park, Keun-Ho Lee:
Constructing a secure hacking-resistant IoT U-healthcare environment. J. Comput. Virol. Hacking Tech. 14(1): 99-106 (2018) - Steffen Pfrang, David Meier:
Detecting and preventing replay attacks in industrial automation networks operated with profinet IO. J. Comput. Virol. Hacking Tech. 14(4): 253-268 (2018) - Edward Raff, Richard Zak, Russell Cox, Jared Sylvester, Paul Yacci, Rebecca Ward, Anna Tracy, Mark McLean, Charles Nicholas:
An investigation of byte n-gram features for malware classification. J. Comput. Virol. Hacking Tech. 14(1): 1-20 (2018) - AliAkbar Sadeghi, Salman Niksefat, Maryam Rostamipour:
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions. J. Comput. Virol. Hacking Tech. 14(2): 139-156 (2018) - Moustafa Saleh, Tao Li, Shouhuai Xu:
Multi-context features for detecting malicious programs. J. Comput. Virol. Hacking Tech. 14(2): 181-193 (2018) - Antonella Santone:
Special issue on formal methods for security engineering. J. Comput. Virol. Hacking Tech. 14(4): 251 (2018) - Manar AbuTalib:
Testing closed source software: computer forensic tool case study. J. Comput. Virol. Hacking Tech. 14(2): 167-179 (2018) - Nikhil Tripathi, Neminath Hubballi:
Detecting stealth DHCP starvation attack using machine learning approach. J. Comput. Virol. Hacking Tech. 14(3): 233-244 (2018)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-01 06:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint