- Julia Bobrysheva, Sergey Zapechnikov:
Post-quantum security of messengers: secure group chats and continuous key distribution protocols. J. Comput. Virol. Hacking Tech. 19(3): 373-380 (2023) - Alvaro Chysi, Stavros D. Nikolopoulos, Iosif Polenakis:
Detection and classification of malicious software utilizing Max-Flows between system-call groups. J. Comput. Virol. Hacking Tech. 19(1): 97-123 (2023) - Gianpiero Costantino, Ilaria Matteucci:
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities. J. Comput. Virol. Hacking Tech. 19(1): 33-49 (2023) - Anna Epishkina, Nikolay Karapetyants, Konstantin Kogos, Philip Lebedev:
Covert channel limitation via special dummy traffic generating. J. Comput. Virol. Hacking Tech. 19(3): 341-349 (2023) - Mark Ermolov, Dmitry Sklyarov, Maxim Goryachy:
Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors. J. Comput. Virol. Hacking Tech. 19(3): 351-365 (2023) - Vladimir M. Fomichev, Alisa M. Koreneva:
Editorial special issue: Russian research in cybersecurity. J. Comput. Virol. Hacking Tech. 19(3): 339-340 (2023) - Meysam Ghahramani, Reza Javidan:
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks. J. Comput. Virol. Hacking Tech. 19(2): 303-317 (2023) - Alejandro Guerra-Manzanares, Hayretdin Bahsi, Marcin Luckner:
Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection. J. Comput. Virol. Hacking Tech. 19(1): 65-96 (2023) - Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. J. Comput. Virol. Hacking Tech. 19(4): 635 (2023)
- Swetha Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, N. Balakrishnan:
XAI for intrusion detection system: comparing explanations based on global and local scope. J. Comput. Virol. Hacking Tech. 19(2): 217-239 (2023) - Hashem Hashemi, Mohammad Ebrahim Samie, Ali Hamzeh:
IFMD: image fusion for malware detection. J. Comput. Virol. Hacking Tech. 19(2): 271-286 (2023) - Nina D. Ivanova, Vitaliy G. Ivanenko:
Modeling advanced persistent threats using risk matrix methods. J. Comput. Virol. Hacking Tech. 19(3): 367-372 (2023) - Dmitriy Izergin, Mikhail Eremeev, Shamil Magomedov:
Risky model of mobile application presentation. J. Comput. Virol. Hacking Tech. 19(3): 419-441 (2023) - Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, Mark Stamp:
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. J. Comput. Virol. Hacking Tech. 19(1): 1-16 (2023) - Maxim O. Kalinin, Vasiliy M. Krundyshev:
Security intrusion detection using quantum machine learning techniques. J. Comput. Virol. Hacking Tech. 19(1): 125-136 (2023) - Chariton Karamitas, Athanasios Kehagias:
Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study. J. Comput. Virol. Hacking Tech. 19(2): 319-337 (2023) - Nikolay Karapetyants, Dmitry Efanov:
A practical approach to learning Linux vulnerabilities. J. Comput. Virol. Hacking Tech. 19(3): 409-418 (2023) - Baijnath Kaushik, Reya Sharma, Kulwant Dhama, Akshma Chadha, Surbhi Sharma:
Performance evaluation of learning models for intrusion detection system using feature selection. J. Comput. Virol. Hacking Tech. 19(4): 529-548 (2023) - Aleksei Kirov, Valerii Sizov:
Development of a method for targeted monitoring and processing of information security incidents of economic entities. J. Comput. Virol. Hacking Tech. 19(3): 381-386 (2023) - Anatoly Konkin, Sergey Zapechnikov:
Zero knowledge proof and ZK-SNARK for private blockchains. J. Comput. Virol. Hacking Tech. 19(3): 443-449 (2023) - Ander Granado Masid, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo:
Application of the SAMA methodology to Ryuk malware. J. Comput. Virol. Hacking Tech. 19(2): 165-198 (2023) - Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour:
An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J. Comput. Virol. Hacking Tech. 19(4): 469-481 (2023) - Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp:
Generative adversarial networks and image-based malware classification. J. Comput. Virol. Hacking Tech. 19(4): 579-595 (2023) - Mahdi Mahdavi Oliaee, Zahra Ahmadian:
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits. J. Comput. Virol. Hacking Tech. 19(4): 515-528 (2023) - Yoshihiro Oyama, Hirotaka Kokubo:
Forced continuation of malware execution beyond exceptions. J. Comput. Virol. Hacking Tech. 19(4): 483-501 (2023) - Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi:
A security vulnerability predictor based on source code metrics. J. Comput. Virol. Hacking Tech. 19(4): 615-633 (2023) - Evgeniy Y. Pavlenko, K. V. Vasil'eva, Daria S. Lavrova, Dmitry P. Zegzhda:
Counteraction the cybersecurity threats of the in-vehicle local network. J. Comput. Virol. Hacking Tech. 19(3): 399-408 (2023) - Anastasia Pereberina, Alexey Kostyushko, Alexander Tormasov:
An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis. J. Comput. Virol. Hacking Tech. 19(3): 459-468 (2023) - Maria A. Poltavtseva, Elena B. Aleksandrova, Vadim S. Shmatov, Peter D. Zegzhda:
Data protection in heterogeneous big data systems. J. Comput. Virol. Hacking Tech. 19(3): 451-458 (2023) - G. S. Ponomarenko, P. G. Klyucharev:
On improvements of robustness of obfuscated JavaScript code detection. J. Comput. Virol. Hacking Tech. 19(3): 387-398 (2023)