![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Computer Virology and Hacking Techniques, Volume 20
Volume 20, Number 1, March 2024
- Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan:
Networking and cryptography library with a non-repudiation flavor for blockchain. 1-14 - Hafiz Usama Ishtiaq, Areeb Ahmed Bhutta, Adnan Noor Mian
:
DHCP DoS and starvation attacks on SDN controllers and their mitigation. 15-25 - Christian Catalano
, Franco Tommasi:
Persistent MobileApp-in-the-Middle (MAitM) attack. 27-39 - Mila Dalla Preda, Michele Ianni
:
Exploiting number theory for dynamic software watermarking. 41-51 - Vrinda Malhotra, Katerina Potika, Mark Stamp
:
A comparison of graph neural networks for malware classification. 53-69 - Hashida Haidros Rahima Manzil
, S. Manohar Naik
:
Android ransomware detection using a novel hamming distance based feature selection. 71-93 - Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili:
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights. 95-111 - Akram Khalesi, Zahra Ahmadian
:
Provably minimum data complexity integral distinguisher based on conventional division property. 113-125 - Grigory B. Marshalko, Svetlana Koreshkova:
Protection against adversarial attacks with randomization of recognition algorithm. 127-133 - Hassan Jameel Asghar
, Benjamin Zi Hao Zhao, Muhammad Ikram
, Giang Linh Duc Nguyen, Dali Kaafar
, Sean Lamont, Daniel Coscia:
Use of cryptography in malware obfuscation. 135-152 - Nguyen Minh Tu, Viet Hung Nguyen
, Nathan Shone:
Using deep graph learning to improve dynamic analysis-based malware detection in PE files. 153-172 - Ritik Mehta, Olha Jurecková, Mark Stamp
:
A natural language processing approach to Malware classification. 173-184 - Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna:
Partial key exposure attack on RSA using some private key blocks. 185-193 - Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna:
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. 195-202 - Rohit Dube
:
Faulty use of the CIC-IDS 2017 dataset in information security research. 203-211
Volume 20, Number 2, June 2024
- Alexander V. Babash
:
Attacks on the simple substitution cipher with the calculation of their reliability. 213-218 - Anatoly Konkin, Sergey Zapechnikov
:
Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains. 219-224 - Evgeniy K. Alekseev
, Sergey Kyazhin
, Stanislav Smyshlyaev:
The threat of forcing the identical roles for authenticated key establishment protocols. 225-230 - Alexey Kurochkin
, Denis Fomin
:
MGM beyond the birthday bound. 231-235 - François Dupont
:
A new Shamir's three pass random matrix ciphering mechanism. 237-248 - Sergey Prokopev
:
Cryptographic protocol conformance testing based on domain-specific state machine. 249-259 - Jesper Bergman
, Oliver Popov
:
Recognition of tor malware and onion services. 261-275 - Anna Epishkina
, Sergey Zapechnikov, Anna Belozubova:
Historical notes on Russian cryptography. 277-293 - Dmitry Zakharov
, M. Pudovkina:
Full round impossible differentials for Feistel ciphers. 295-300 - Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Demonstration of new attacks on three healthcare network protocols in a lab environment. 301-314 - Eldar Boltachev
:
Correction to: Potential cyber threats of adversarial attacks on autonomous driving models. 315 - Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Explainable Ransomware Detection with Deep Learning Techniques. 317-330 - Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Picker Blinder: a framework for automatic injection of malicious inter-app communication. 331-346
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.