


default search action
Journal in Computer Virology, Volume 6
Volume 6, Number 1, February 2010
- Sébastien Tricaud, Philippe Saadé:

Applied parallel coordinates for logs and network traffic attack analysis. 1-29 - Ezzat Kirmani, Cynthia S. Hood:

Analysis of a scanning model of worm propagation. 31-42 - Safaa O. Al-Mamory

, Hongli Zhang:
New data mining technique to enhance IDS alarms quality. 43-55 - Humberto J. Abdelnur, Radu State, Olivier Festor:

Advanced fuzzing in the VoIP space. 57-64 - Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:

Simulating malware with MAlSim. 65-75 - Alexandre Gazet:

Comparative analysis of various ransomware virii. 77-90
Volume 6, Number 2, May 2010
- Gil Tahan, Chanan Glezer

, Yuval Elovici, Lior Rokach:
Auto-Sign: an automatic signature generator for high-speed malware filtering devices. 91-103 - Simon Kramer

, Julian C. Bradfield:
A general definition of malware. 105-114 - Hazem M. El-Bakry

:
Fast virus detection by using high speed time delay neural networks. 115-122 - Eric Uday Kumar:

User-mode memory scanning on 32-bit & 64-bit windows. 123-141 - Frédéric Raynal, François Gaspard:

Small treatise about e-manipulation for honest people. 143-159 - Jose Andre Morales

, Peter J. Clarke
, Yi Deng:
Identification of file infecting viruses through detection of self-reference replication. 161-180
Volume 6, Number 3, August 2010
- Boris Lau, Vanja Svajcer:

Measuring virtual machine detection in malware using DSD tracer. 181-195 - Patrice Auffret:

SinFP, unification of active and passive operating system fingerprinting. 197-205 - Jean-Baptiste Bedrune, Eric Filiol

, Frédéric Raynal:
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis. 207-237 - Asaf Shabtai, Yuval Fledel, Yuval Elovici, Yuval Shahar

:
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics. 239-259 - Yoann Guillot, Alexandre Gazet:

Automatic binary deobfuscation. 261-276 - Jean-Marie Borello, Eric Filiol

, Ludovic Mé:
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques. 277-287
Volume 6, Number 4, November 2010
- Frédéric Raynal, Guillaume Delugré, Damien Aumaitre:

Malicious origami in PDF. 289-315 - Mikaël Salaün:

Practical overview of a Xen covert channel. 317-328 - Guillaume Prigent, Florian Vichot, Fabrice Harrouet:

IpMorph: fingerprinting spoofing unification. 329-342 - Julien Iguchi-Cartigny, Jean-Louis Lanet:

Developing a Trojan applets in a smart card. 343-351 - Loïc Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin:

ACPI and SMI handlers: some limits to trusted computing. 353-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














