Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2008
- Hervé Aïache, François Haettel, Laure Lebrun, Cédric Tavernier:
Improving security and performance of an Ad Hoc network through a multipath routing strategy. J. Comput. Virol. 4(4): 267-278 (2008) - Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche:
Internet attacks monitoring with dynamic connection redirection mechanisms. J. Comput. Virol. 4(2): 127-136 (2008) - Xavier Allamigeon, Charles Hymans:
Static analysis by abstract interpretation: application to the detection of heap overflows. J. Comput. Virol. 4(1): 5-23 (2008) - Stanley J. Barr, Samuel J. Cardman, David M. Martin:
A boosting ensemble for the recognition of code sharing in malware. J. Comput. Virol. 4(4): 335-345 (2008) - Philippe Biondi, Eric Filiol:
Foreword. J. Comput. Virol. 4(1): 1-3 (2008) - Jean-Marie Borello, Ludovic Mé:
Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3): 211-220 (2008) - Laurent Butti, Julien Tinnés:
Discovering and exploiting 802.11 wireless driver vulnerabilities. J. Comput. Virol. 4(1): 25-37 (2008) - Guillaume Duc, Ronan Keryell:
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. J. Comput. Virol. 4(2): 101-113 (2008) - Stéphane Duverger:
Linux 2.6 kernel exploits. J. Comput. Virol. 4(1): 39-60 (2008) - Renaud Feil, Louis Nyffenegger:
Evolution of cross site request forgery attacks. J. Comput. Virol. 4(1): 61-71 (2008) - Eric Filiol:
Editorial. J. Comput. Virol. 4(3): 159-160 (2008) - Grégoire Jacob, Hervé Debar, Eric Filiol:
Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4(3): 251-266 (2008) - Grégoire Jacob, Eric Filiol, Hervé Debar:
Malware as interaction machines: a new framework for behavior modelling. J. Comput. Virol. 4(3): 235-250 (2008) - Martin Johns:
On JavaScript Malware and related threats. J. Comput. Virol. 4(3): 161-178 (2008) - Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson:
On the adaptive real-time detection of fast-propagating network worms. J. Comput. Virol. 4(3): 197-210 (2008) - Éric Lacombe, Frédéric Raynal, Vincent Nicomette:
Rootkit modeling and experiments under Linux. J. Comput. Virol. 4(2): 137-157 (2008) - Philippe Lagadec:
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007). J. Comput. Virol. 4(2): 115-125 (2008) - Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan:
Enhancing web browser security against malware extensions. J. Comput. Virol. 4(3): 179-195 (2008) - Simon Marechal:
Advances in password cracking. J. Comput. Virol. 4(1): 73-81 (2008) - Jose Andre Morales, Peter J. Clarke, Yi Deng, B. M. Golam Kibria:
Characterization of virus replication. J. Comput. Virol. 4(3): 221-234 (2008) - Nicolas Ruff:
Windows memory forensics. J. Comput. Virol. 4(2): 83-100 (2008) - Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung:
SQL infections through RFID. J. Comput. Virol. 4(4): 347-356 (2008) - Gérard Wagener, Radu State, Alexandre Dulaunoy:
Malware behaviour analysis. J. Comput. Virol. 4(4): 279-287 (2008) - Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia:
Constructing malware normalizers using term rewriting. J. Comput. Virol. 4(4): 307-322 (2008) - Matt Webster, Grant Malcolm:
Formal affordance-based models of computer virus reproduction. J. Comput. Virol. 4(4): 289-306 (2008) - Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, Qingshan Jiang:
An intelligent PE-malware detection system based on association mining. J. Comput. Virol. 4(4): 323-334 (2008)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-04 10:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint