default search action
Journal of Computer Virology and Hacking Techniques, Volume 12
Volume 12, Number 1, February 2016
- Ciprian Oprisa, George Cabau, Gheorghe Sebestyen-Pal:
Malware clustering using suffix trees. 1-10 - Ghita Mezzour, L. Richard Carley, Kathleen M. Carley:
Longitudinal analysis of a large corpus of cyber threat descriptions. 11-22 - Andrei Lutas, Adrian Colesa, Sándor Lukács, Dan Lutas:
U-HIPE: hypervisor-based protection of user-mode processes in Windows. 23-36 - Adrian-Stefan Popescu, Dragos Teodor Gavrilut, Daniel-Ionut Irimia:
A practical approach for clustering large data flows of malicious URLs. 37-47
Volume 12, Number 2, May 2016
- Matthew Asquith:
Extremely scalable storage and clustering of malware metadata. 49-58 - Hisham Shehata Galal, Youssef Bassyouni Mahdy, Mohammed Ali Atiea:
Behavior-based features model for malware detection. 59-67 - Amine Boukhtouta, Serguei A. Mokhov, Nour-Eddine Lakhdari, Mourad Debbabi, Joey Paquet:
Network malware classification comparison using DPI and flow packet headers. 69-100 - Kesav Kancherla, John Donahue, Srinivas Mukkamala:
Packer identification using Byte plot and Markov plot. 101-111 - Andrea Miele:
Buffer overflow vulnerabilities in CUDA: a preliminary analysis. 113-120
Volume 12, Number 3, August 2016
- Yu-Keum Jeong, Roy C. Park:
Knowledge-based System and Security. 121-123 - MyounJae Lee:
Secure game development for IoT environment. 125-130 - Olivier Ferrand, Eric Filiol:
Combinatorial detection of malware by IAT discrimination. 131-136 - Sunghyuck Hong:
Two-channel user authentication by using USB on Cloud. 137-143 - Yong-Chan Kim, Jongkun Lee:
A secure analysis of vehicular authentication security scheme of RSUs in VANET. 145-150 - Do Yeon Kim, GuoZhong Li, Seong-Taek Park, Mi-Hyun Ko:
A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis. 151-161 - Bo-Seon Kang, Keun-Ho Lee:
2-Channel authentication technique using cardiac impulse based OTP. 163-167 - Kiyoung Kim, Byung-Joon Park, Yuhwa Suh, Jae-Pyo Park:
OTT user authentication system by age classification. 169-175 - Joon-Ho Kim, Myung-Chul Ma, Jae-Pyo Park:
An analysis on secure coding using symbolic execution engine. 177-184 - Hyung-Jin Mun, Kun-Hee Han:
Blackhole attack: user identity and password seize attack using honeypot. 185-190 - Jonathan Dechaux, Eric Filiol:
Proactive defense against malicious documents: formalization, implementation and case studies. 191-202
Volume 12, Number 4, November 2016
- Tanuvir Singh, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Support vector machines and malware detection. 203-212 - Usha Narra, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Clustering versus SVM for malware detection. 213-224 - Joseph Sexton, Curtis B. Storlie, Blake Anderson:
Subroutine based detection of APT malware. 225-233 - Rebecca Schuller Borbely:
On normalized compression distance and large malware - Towards a useful definition of normalized compression distance for the classification of large files. 235-242 - Gerardo Canfora, Corrado Aaron Visaggio:
A set of features to detect web security threats. 243-261
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.