Search dblp for Publications

export results for "toc:db/journals/virology/virology9.bht:"

 download as .bib file

@article{DBLP:journals/virology/BaratPG13,
  author       = {Marius Barat and
                  Dumitru{-}Bogdan Prelipcean and
                  Dragos Teodor Gavrilut},
  title        = {A study on common malware families evolution in 2012},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {4},
  pages        = {171--178},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0192-5},
  doi          = {10.1007/S11416-013-0192-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BaratPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BaysaLS13,
  author       = {Donabelle Baysa and
                  Richard M. Low and
                  Mark Stamp},
  title        = {Structural entropy and metamorphic malware},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {4},
  pages        = {179--192},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0185-4},
  doi          = {10.1007/S11416-013-0185-4},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/BaysaLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BroucekT13,
  author       = {Vlasti Broucek and
                  Paul Turner},
  title        = {Technical, legal and ethical dilemmas: distinguishing risks arising
                  from malware and cyber-attack tools in the 'cloud' - a forensic computing
                  perspective},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {1},
  pages        = {27--33},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-012-0173-0},
  doi          = {10.1007/S11416-012-0173-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BroucekT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/CaoMLG13,
  author       = {Ying Cao and
                  Qiguang Miao and
                  Jiachen Liu and
                  Lin Gao},
  title        = {Abstracting minimal security-relevant behaviors for malware analysis},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {4},
  pages        = {193--204},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0186-3},
  doi          = {10.1007/S11416-013-0186-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/CaoMLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ChouchaneSWL13,
  author       = {Radhouane Chouchane and
                  Natalia Stakhanova and
                  Andrew Walenstein and
                  Arun Lakhotia},
  title        = {Detecting machine-morphed malware variants via engine attribution},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {3},
  pages        = {137--157},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0183-6},
  doi          = {10.1007/S11416-013-0183-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ChouchaneSWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DavidLS13,
  author       = {Baptiste David and
                  Dorian Larget and
                  Thibaut Scherrer},
  title        = {The security of databases: the Access case},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {2},
  pages        = {95--107},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0182-7},
  doi          = {10.1007/S11416-013-0182-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/DavidLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Dechaux13,
  author       = {Jonathan Dechaux},
  title        = {The Office Demon: Minos},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {3},
  pages        = {125--135},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0180-9},
  doi          = {10.1007/S11416-013-0180-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Dechaux13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EijkhoudtS13,
  author       = {Arnim Eijkhoudt and
                  Tristan Suerink},
  title        = {Uforia: Universal forensic indexer and analyzer},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {2},
  pages        = {59--63},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0177-4},
  doi          = {10.1007/S11416-013-0177-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/EijkhoudtS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EskandariKH13,
  author       = {Mojtaba Eskandari and
                  Zeinab Khorshidpour and
                  Sattar Hashemi},
  title        = {HDM-Analyser: a hybrid analysis approach based on data mining techniques
                  for malware detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {2},
  pages        = {77--93},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0181-8},
  doi          = {10.1007/S11416-013-0181-8},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/EskandariKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/GoichonSPF13,
  author       = {Fran{\c{c}}ois Goichon and
                  Guillaume Salagnac and
                  Pierre Parrend and
                  St{\'{e}}phane Fr{\'{e}}not},
  title        = {Static vulnerability detection in Java service-oriented components},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {1},
  pages        = {15--26},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-012-0172-1},
  doi          = {10.1007/S11416-012-0172-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/GoichonSPF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Hamon13,
  author       = {Valentin Hamon},
  title        = {Malicious {URI} resolving in {PDF} documents},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {2},
  pages        = {65--76},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0179-2},
  doi          = {10.1007/S11416-013-0179-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Hamon13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LakhotiaWMS13,
  author       = {Arun Lakhotia and
                  Andrew Walenstein and
                  Craig Miles and
                  Anshuman Singh},
  title        = {{VILO:} a rapid learning nearest-neighbor classifier for malware triage},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {3},
  pages        = {109--123},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0178-3},
  doi          = {10.1007/S11416-013-0178-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/LakhotiaWMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ShanmugamLS13,
  author       = {Gayathri Shanmugam and
                  Richard M. Low and
                  Mark Stamp},
  title        = {Simple substitution distance and metamorphic detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {3},
  pages        = {159--170},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0184-5},
  doi          = {10.1007/S11416-013-0184-5},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ShanmugamLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SridharaS13,
  author       = {Sudarshan Madenur Sridhara and
                  Mark Stamp},
  title        = {Metamorphic worm that carries its own morphing engine},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {2},
  pages        = {49--58},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-012-0174-z},
  doi          = {10.1007/S11416-012-0174-Z},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/SridharaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/TodericiS13,
  author       = {Annie H. Toderici and
                  Mark Stamp},
  title        = {Chi-squared distance and metamorphic virus detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {1},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-012-0171-2},
  doi          = {10.1007/S11416-012-0171-2},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/TodericiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/VatamanuGB13,
  author       = {Cristina Vatamanu and
                  Dragos Gavrilut and
                  Razvan{-}Mihai Benchea},
  title        = {Building a practical and reliable classifier for malware detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {4},
  pages        = {205--214},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0188-1},
  doi          = {10.1007/S11416-013-0188-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/VatamanuGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/XuWQXZRZ13,
  author       = {Ming Xu and
                  Lingfei Wu and
                  Shuhui Qi and
                  Jian Xu and
                  Haiping Zhang and
                  Yizhi Ren and
                  Ning Zheng},
  title        = {A similarity metric method of obfuscated malware using function-call
                  graph},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {1},
  pages        = {35--47},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-012-0175-y},
  doi          = {10.1007/S11416-012-0175-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/XuWQXZRZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics