Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/virology/virology9.bht:"
@article{DBLP:journals/virology/BaratPG13, author = {Marius Barat and Dumitru{-}Bogdan Prelipcean and Dragos Teodor Gavrilut}, title = {A study on common malware families evolution in 2012}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {4}, pages = {171--178}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0192-5}, doi = {10.1007/S11416-013-0192-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BaratPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BaysaLS13, author = {Donabelle Baysa and Richard M. Low and Mark Stamp}, title = {Structural entropy and metamorphic malware}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {4}, pages = {179--192}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0185-4}, doi = {10.1007/S11416-013-0185-4}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/BaysaLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BroucekT13, author = {Vlasti Broucek and Paul Turner}, title = {Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {1}, pages = {27--33}, year = {2013}, url = {https://doi.org/10.1007/s11416-012-0173-0}, doi = {10.1007/S11416-012-0173-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BroucekT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/CaoMLG13, author = {Ying Cao and Qiguang Miao and Jiachen Liu and Lin Gao}, title = {Abstracting minimal security-relevant behaviors for malware analysis}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {4}, pages = {193--204}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0186-3}, doi = {10.1007/S11416-013-0186-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/CaoMLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ChouchaneSWL13, author = {Radhouane Chouchane and Natalia Stakhanova and Andrew Walenstein and Arun Lakhotia}, title = {Detecting machine-morphed malware variants via engine attribution}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {3}, pages = {137--157}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0183-6}, doi = {10.1007/S11416-013-0183-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ChouchaneSWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DavidLS13, author = {Baptiste David and Dorian Larget and Thibaut Scherrer}, title = {The security of databases: the Access case}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {2}, pages = {95--107}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0182-7}, doi = {10.1007/S11416-013-0182-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/DavidLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Dechaux13, author = {Jonathan Dechaux}, title = {The Office Demon: Minos}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {3}, pages = {125--135}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0180-9}, doi = {10.1007/S11416-013-0180-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Dechaux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/EijkhoudtS13, author = {Arnim Eijkhoudt and Tristan Suerink}, title = {Uforia: Universal forensic indexer and analyzer}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {2}, pages = {59--63}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0177-4}, doi = {10.1007/S11416-013-0177-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/EijkhoudtS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/EskandariKH13, author = {Mojtaba Eskandari and Zeinab Khorshidpour and Sattar Hashemi}, title = {HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {2}, pages = {77--93}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0181-8}, doi = {10.1007/S11416-013-0181-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/EskandariKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/GoichonSPF13, author = {Fran{\c{c}}ois Goichon and Guillaume Salagnac and Pierre Parrend and St{\'{e}}phane Fr{\'{e}}not}, title = {Static vulnerability detection in Java service-oriented components}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {1}, pages = {15--26}, year = {2013}, url = {https://doi.org/10.1007/s11416-012-0172-1}, doi = {10.1007/S11416-012-0172-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/GoichonSPF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Hamon13, author = {Valentin Hamon}, title = {Malicious {URI} resolving in {PDF} documents}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {2}, pages = {65--76}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0179-2}, doi = {10.1007/S11416-013-0179-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Hamon13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LakhotiaWMS13, author = {Arun Lakhotia and Andrew Walenstein and Craig Miles and Anshuman Singh}, title = {{VILO:} a rapid learning nearest-neighbor classifier for malware triage}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {3}, pages = {109--123}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0178-3}, doi = {10.1007/S11416-013-0178-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/LakhotiaWMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ShanmugamLS13, author = {Gayathri Shanmugam and Richard M. Low and Mark Stamp}, title = {Simple substitution distance and metamorphic detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {3}, pages = {159--170}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0184-5}, doi = {10.1007/S11416-013-0184-5}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ShanmugamLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SridharaS13, author = {Sudarshan Madenur Sridhara and Mark Stamp}, title = {Metamorphic worm that carries its own morphing engine}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {2}, pages = {49--58}, year = {2013}, url = {https://doi.org/10.1007/s11416-012-0174-z}, doi = {10.1007/S11416-012-0174-Z}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/SridharaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/TodericiS13, author = {Annie H. Toderici and Mark Stamp}, title = {Chi-squared distance and metamorphic virus detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {1}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.1007/s11416-012-0171-2}, doi = {10.1007/S11416-012-0171-2}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/TodericiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/VatamanuGB13, author = {Cristina Vatamanu and Dragos Gavrilut and Razvan{-}Mihai Benchea}, title = {Building a practical and reliable classifier for malware detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {4}, pages = {205--214}, year = {2013}, url = {https://doi.org/10.1007/s11416-013-0188-1}, doi = {10.1007/S11416-013-0188-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/VatamanuGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/XuWQXZRZ13, author = {Ming Xu and Lingfei Wu and Shuhui Qi and Jian Xu and Haiping Zhang and Yizhi Ren and Ning Zheng}, title = {A similarity metric method of obfuscated malware using function-call graph}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {1}, pages = {35--47}, year = {2013}, url = {https://doi.org/10.1007/s11416-012-0175-y}, doi = {10.1007/S11416-012-0175-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/XuWQXZRZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.