Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/virology/virology10.bht:"
@article{DBLP:journals/virology/AcharaLRC14, author = {Jagdish Prasad Achara and James{-}Douglass Lefruit and Vincent Roca and Claude Castelluccia}, title = {Detecting privacy leaks in the {RATP} App: how we proceeded and what we found}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {4}, pages = {229--238}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0197-0}, doi = {10.1007/S11416-013-0197-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/AcharaLRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AhnLLC14, author = {Hyochang Ahn and Yong{-}Hwan Lee and June{-}Hwan Lee and Han{-}Jin Cho}, title = {A low complexity image stitching using advanced feature matching in mobile environments}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {129--136}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0207-x}, doi = {10.1007/S11416-014-0207-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/AhnLLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BarakatHARHSR14, author = {Osamah L. Barakat and Shaiful J. Hashim and Raja Syamsul Azmir Raja Abdullah and Abdul Rahman Ramli and Fazirulhisyam Hashim and Khairulmizam Samsudin and Mahmud Ab Rahman}, title = {Malware analysis performance enhancement using cloud computing}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {1}, pages = {1--10}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0187-2}, doi = {10.1007/S11416-013-0187-2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BarakatHARHSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BonettiVFMZ14, author = {Gabriele Bonetti and Marco Viglione and Alessandro Frossi and Federico Maggi and Stefano Zanero}, title = {Black-box forensic and antiforensic characteristics of solid-state drives}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {4}, pages = {255--271}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0221-z}, doi = {10.1007/S11416-014-0221-Z}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BonettiVFMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BouffardL14, author = {Guillaume Bouffard and Jean{-}Louis Lanet}, title = {Reversing the operating system of a Java based smart card}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {4}, pages = {239--253}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0218-7}, doi = {10.1007/S11416-014-0218-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/BouffardL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BrandtS14, author = {Nikki Benecke Brandt and Mark Stamp}, title = {Automating {NFC} message sending for good and evil}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {4}, pages = {273--297}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0223-x}, doi = {10.1007/S11416-014-0223-X}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/BrandtS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/CanforaIV14, author = {Gerardo Canfora and Antonio Niccol{\`{o}} Iannaccone and Corrado Aaron Visaggio}, title = {Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {1}, pages = {11--27}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0189-0}, doi = {10.1007/S11416-013-0189-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/CanforaIV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/CherukuriMS14, author = {Manoj Cherukuri and Srinivas Mukkamala and Dongwan Shin}, title = {Detection of shellcodes in drive-by attacks using kernel machines}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {3}, pages = {189--203}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0195-2}, doi = {10.1007/S11416-013-0195-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/CherukuriMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ChoiH14, author = {Myoung{-}Kyu Choi and Kyeong{-}Seok Han}, title = {A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {145--156}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0209-8}, doi = {10.1007/S11416-014-0209-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ChoiH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ChoiLRH14, author = {Young Jin Choi and Gyu Jang Lee and Jong{-}Hei Ra and Whiejong M. Han}, title = {Adjusting context-aware {RFID} in health screening center}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {115--118}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0211-1}, doi = {10.1007/S11416-014-0211-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ChoiLRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Cunche14, author = {Mathieu Cunche}, title = {I know your {MAC} address: targeted tracking of individual using Wi-Fi}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {4}, pages = {219--227}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0196-1}, doi = {10.1007/S11416-013-0196-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Cunche14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DeshpandePS14, author = {Sayali Deshpande and Young Hee Park and Mark Stamp}, title = {Eigenvalue analysis for metamorphic detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {1}, pages = {53--65}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0193-4}, doi = {10.1007/S11416-013-0193-4}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/DeshpandePS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/FeistMP14, author = {Josselin Feist and Laurent Mounier and Marie{-}Laure Potet}, title = {Statically detecting use after free on binary code}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {3}, pages = {211--217}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0203-1}, doi = {10.1007/S11416-014-0203-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/FeistMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Jeong14, author = {Sam Jin Jeong}, title = {A loop splitting method for single loops with non-uniform dependences}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {137--143}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0208-9}, doi = {10.1007/S11416-014-0208-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Jeong14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KimH14, author = {Man Ki Kim and You Sik Hong}, title = {Implementation of a web-based smart electronic needle system}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {101--108}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0214-y}, doi = {10.1007/S11416-014-0214-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KimH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KimP14, author = {Sang Gyun Kim and Jong Sun Park}, title = {Legal limits of search and seizure for digital forensic in Korea}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {157--163}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0212-0}, doi = {10.1007/S11416-014-0212-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KimP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KimPBK14, author = {So Hyeon Kim and Hyun Park and Hyo{-}Chan Bang and Do{-}Hyeun Kim}, title = {An indoor location tracking based on mobile {RFID} for smart exhibition service}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {89--96}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0200-4}, doi = {10.1007/S11416-014-0200-4}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KimPBK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KimPCM14, author = {Dong{-}Hwan Kim and Park Kyung{-}Hye and Gye{-}woon Choi and Kyung{-}jin Min}, title = {A study on the factors that affect the adoption of Smart Water Grid}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {119--128}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0206-y}, doi = {10.1007/S11416-014-0206-Y}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KimPCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KimPK14, author = {Taehan Kim and Hyunmin Park and Bokeun Kim}, title = {Heuristic estimation of network capacity and spectrum requirement}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {97--100}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0198-z}, doi = {10.1007/S11416-013-0198-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KimPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KwonL14, author = {Il{-}Kyoung Kwon and Sang{-}Yong Lee}, title = {Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {71--80}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0199-y}, doi = {10.1007/S11416-013-0199-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KwonL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LimK14, author = {Dae{-}Eun Lim and Tae{-}Sung Kim}, title = {Modeling discovery and removal of security vulnerabilities in software system using priority queueing models}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {109--114}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0205-z}, doi = {10.1007/S11416-014-0205-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LimK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MaheC14, author = {Eric Mahe and Jean{-}Marie Chauvet}, title = {Secrets from the {GPU} - True random bit generation and faster Diffie-Hellman for systemic cryptography}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {3}, pages = {205--210}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0202-2}, doi = {10.1007/S11416-014-0202-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/MaheC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/OhGJC14, author = {Sang{-}Yeob Oh and Supratip Ghose and Hye{-}Jung Jang and Kyungyong Chung}, title = {Recent trends in Mobile Communication Systems}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {67--70}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0213-z}, doi = {10.1007/S11416-014-0213-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/OhGJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/OprisaCC14, author = {Ciprian Oprisa and George Cabau and Adrian Colesa}, title = {Automatic code features extraction using bio-inspired algorithms}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {3}, pages = {165--176}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0191-6}, doi = {10.1007/S11416-013-0191-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/OprisaCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RrushiG14, author = {Julian L. Rrushi and Ali A. Ghorbani}, title = {A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {1}, pages = {29--51}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0190-7}, doi = {10.1007/S11416-013-0190-7}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/RrushiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SimB14, author = {Sung{-}Ho Sim and Su{-}Jin Baek}, title = {A study on scalable information matching system based on web service information}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {2}, pages = {81--88}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0204-0}, doi = {10.1007/S11416-014-0204-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/SimB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/TamboliAS14, author = {Teja Tamboli and Thomas H. Austin and Mark Stamp}, title = {Metamorphic code generation from {LLVM} bytecode}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {3}, pages = {177--187}, year = {2014}, url = {https://doi.org/10.1007/s11416-013-0194-3}, doi = {10.1007/S11416-013-0194-3}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/TamboliAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.