Search dblp for Publications

export results for "toc:db/journals/virology/virology10.bht:"

 download as .bib file

@article{DBLP:journals/virology/AcharaLRC14,
  author       = {Jagdish Prasad Achara and
                  James{-}Douglass Lefruit and
                  Vincent Roca and
                  Claude Castelluccia},
  title        = {Detecting privacy leaks in the {RATP} App: how we proceeded and what
                  we found},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {4},
  pages        = {229--238},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0197-0},
  doi          = {10.1007/S11416-013-0197-0},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/AcharaLRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AhnLLC14,
  author       = {Hyochang Ahn and
                  Yong{-}Hwan Lee and
                  June{-}Hwan Lee and
                  Han{-}Jin Cho},
  title        = {A low complexity image stitching using advanced feature matching in
                  mobile environments},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {129--136},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0207-x},
  doi          = {10.1007/S11416-014-0207-X},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/AhnLLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BarakatHARHSR14,
  author       = {Osamah L. Barakat and
                  Shaiful J. Hashim and
                  Raja Syamsul Azmir Raja Abdullah and
                  Abdul Rahman Ramli and
                  Fazirulhisyam Hashim and
                  Khairulmizam Samsudin and
                  Mahmud Ab Rahman},
  title        = {Malware analysis performance enhancement using cloud computing},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {1},
  pages        = {1--10},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0187-2},
  doi          = {10.1007/S11416-013-0187-2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BarakatHARHSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BonettiVFMZ14,
  author       = {Gabriele Bonetti and
                  Marco Viglione and
                  Alessandro Frossi and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Black-box forensic and antiforensic characteristics of solid-state
                  drives},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {4},
  pages        = {255--271},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0221-z},
  doi          = {10.1007/S11416-014-0221-Z},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BonettiVFMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BouffardL14,
  author       = {Guillaume Bouffard and
                  Jean{-}Louis Lanet},
  title        = {Reversing the operating system of a Java based smart card},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {4},
  pages        = {239--253},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0218-7},
  doi          = {10.1007/S11416-014-0218-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/BouffardL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BrandtS14,
  author       = {Nikki Benecke Brandt and
                  Mark Stamp},
  title        = {Automating {NFC} message sending for good and evil},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {4},
  pages        = {273--297},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0223-x},
  doi          = {10.1007/S11416-014-0223-X},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/BrandtS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/CanforaIV14,
  author       = {Gerardo Canfora and
                  Antonio Niccol{\`{o}} Iannaccone and
                  Corrado Aaron Visaggio},
  title        = {Static analysis for the detection of metamorphic computer viruses
                  using repeated-instructions counting heuristics},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {1},
  pages        = {11--27},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0189-0},
  doi          = {10.1007/S11416-013-0189-0},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/CanforaIV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/CherukuriMS14,
  author       = {Manoj Cherukuri and
                  Srinivas Mukkamala and
                  Dongwan Shin},
  title        = {Detection of shellcodes in drive-by attacks using kernel machines},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {3},
  pages        = {189--203},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0195-2},
  doi          = {10.1007/S11416-013-0195-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/CherukuriMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ChoiH14,
  author       = {Myoung{-}Kyu Choi and
                  Kyeong{-}Seok Han},
  title        = {A study on the service quality of SMEs management consulting affecting
                  the perceived management performance in mobile communication environments},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {145--156},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0209-8},
  doi          = {10.1007/S11416-014-0209-8},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ChoiH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ChoiLRH14,
  author       = {Young Jin Choi and
                  Gyu Jang Lee and
                  Jong{-}Hei Ra and
                  Whiejong M. Han},
  title        = {Adjusting context-aware {RFID} in health screening center},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {115--118},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0211-1},
  doi          = {10.1007/S11416-014-0211-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ChoiLRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Cunche14,
  author       = {Mathieu Cunche},
  title        = {I know your {MAC} address: targeted tracking of individual using Wi-Fi},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {4},
  pages        = {219--227},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0196-1},
  doi          = {10.1007/S11416-013-0196-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Cunche14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DeshpandePS14,
  author       = {Sayali Deshpande and
                  Young Hee Park and
                  Mark Stamp},
  title        = {Eigenvalue analysis for metamorphic detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {1},
  pages        = {53--65},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0193-4},
  doi          = {10.1007/S11416-013-0193-4},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/DeshpandePS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/FeistMP14,
  author       = {Josselin Feist and
                  Laurent Mounier and
                  Marie{-}Laure Potet},
  title        = {Statically detecting use after free on binary code},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {3},
  pages        = {211--217},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0203-1},
  doi          = {10.1007/S11416-014-0203-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/FeistMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Jeong14,
  author       = {Sam Jin Jeong},
  title        = {A loop splitting method for single loops with non-uniform dependences},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {137--143},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0208-9},
  doi          = {10.1007/S11416-014-0208-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Jeong14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KimH14,
  author       = {Man Ki Kim and
                  You Sik Hong},
  title        = {Implementation of a web-based smart electronic needle system},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {101--108},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0214-y},
  doi          = {10.1007/S11416-014-0214-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KimH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KimP14,
  author       = {Sang Gyun Kim and
                  Jong Sun Park},
  title        = {Legal limits of search and seizure for digital forensic in Korea},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {157--163},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0212-0},
  doi          = {10.1007/S11416-014-0212-0},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KimP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KimPBK14,
  author       = {So Hyeon Kim and
                  Hyun Park and
                  Hyo{-}Chan Bang and
                  Do{-}Hyeun Kim},
  title        = {An indoor location tracking based on mobile {RFID} for smart exhibition
                  service},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {89--96},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0200-4},
  doi          = {10.1007/S11416-014-0200-4},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KimPBK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KimPCM14,
  author       = {Dong{-}Hwan Kim and
                  Park Kyung{-}Hye and
                  Gye{-}woon Choi and
                  Kyung{-}jin Min},
  title        = {A study on the factors that affect the adoption of Smart Water Grid},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {119--128},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0206-y},
  doi          = {10.1007/S11416-014-0206-Y},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KimPCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KimPK14,
  author       = {Taehan Kim and
                  Hyunmin Park and
                  Bokeun Kim},
  title        = {Heuristic estimation of network capacity and spectrum requirement},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {97--100},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0198-z},
  doi          = {10.1007/S11416-013-0198-Z},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KimPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KwonL14,
  author       = {Il{-}Kyoung Kwon and
                  Sang{-}Yong Lee},
  title        = {Choquet integral-based product satisfaction inference in consideration
                  of subjective decision-making tendencies},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {71--80},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0199-y},
  doi          = {10.1007/S11416-013-0199-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KwonL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LimK14,
  author       = {Dae{-}Eun Lim and
                  Tae{-}Sung Kim},
  title        = {Modeling discovery and removal of security vulnerabilities in software
                  system using priority queueing models},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {109--114},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0205-z},
  doi          = {10.1007/S11416-014-0205-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LimK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MaheC14,
  author       = {Eric Mahe and
                  Jean{-}Marie Chauvet},
  title        = {Secrets from the {GPU} - True random bit generation and faster Diffie-Hellman
                  for systemic cryptography},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {3},
  pages        = {205--210},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0202-2},
  doi          = {10.1007/S11416-014-0202-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/MaheC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/OhGJC14,
  author       = {Sang{-}Yeob Oh and
                  Supratip Ghose and
                  Hye{-}Jung Jang and
                  Kyungyong Chung},
  title        = {Recent trends in Mobile Communication Systems},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {67--70},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0213-z},
  doi          = {10.1007/S11416-014-0213-Z},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/OhGJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/OprisaCC14,
  author       = {Ciprian Oprisa and
                  George Cabau and
                  Adrian Colesa},
  title        = {Automatic code features extraction using bio-inspired algorithms},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {3},
  pages        = {165--176},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0191-6},
  doi          = {10.1007/S11416-013-0191-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/OprisaCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RrushiG14,
  author       = {Julian L. Rrushi and
                  Ali A. Ghorbani},
  title        = {A mathematical exploitation of simulated uniform scanning botnet propagation
                  dynamics for early stage detection and management},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {1},
  pages        = {29--51},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0190-7},
  doi          = {10.1007/S11416-013-0190-7},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/RrushiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SimB14,
  author       = {Sung{-}Ho Sim and
                  Su{-}Jin Baek},
  title        = {A study on scalable information matching system based on web service
                  information},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {2},
  pages        = {81--88},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0204-0},
  doi          = {10.1007/S11416-014-0204-0},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/SimB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/TamboliAS14,
  author       = {Teja Tamboli and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Metamorphic code generation from {LLVM} bytecode},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {3},
  pages        = {177--187},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-013-0194-3},
  doi          = {10.1007/S11416-013-0194-3},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/TamboliAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics