default search action
Journal of Computer Virology and Hacking Techniques, Volume 13
Volume 13, Number 1, February 2017
- Anusha Damodaran, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
A comparison of static, dynamic, and hybrid analysis for malware detection. 1-12 - Julian L. Rrushi:
Plaintext side channels in TLS Chiphertex. 13-27 - Stavros D. Nikolopoulos, Iosif Polenakis:
A graph-based model for malware detection and classification using system-call groups. 29-46 - Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser:
Semantics-aware detection of targeted attacks: a survey. 47-85
Volume 13, Number 2, May 2017
- Baptiste David, Eric Filiol, Kévin Gallienne:
Structural analysis of binary executable headers for malware detection optimization. 87-93 - Swathi Pai, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Clustering for malware classification. 95-107 - Mozhdeh Farhadi, Jean-Louis Lanet:
Chronicle of a Java Card death. 109-123 - Varsha M. V., P. Vinod, K. A. Dhanya:
Identification of malicious android app using manifest and opcode features. 125-138 - Ricardo J. Rodríguez:
Erratum to: Evolution and characterization of point-of-sale RAM scraping malware. 139
Volume 13, Number 3, August 2017
- Sukanya Thakur, Mark Stamp:
A completely covert audio channel in Android. 141-152 - Hashem Hashemi, Amin Azmoodeh, Ali Hamzeh, Sattar Hashemi:
Graph embedding as a new approach for unknown malware detection. 153-166 - Jiang Ming, Dongpeng Xu, Dinghao Wu:
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. 167-178 - Ricardo J. Rodríguez:
Evolution and characterization of point-of-sale RAM scraping malware. 179-192 - Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Impeding behavior-based malware analysis via replacement attacks to malware specifications. 193-207 - Mila Dalla Preda, Federico Maggi:
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology. 209-232 - Kyung-Hwan Cha, Dae-Ki Kang:
Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection. 233-238
Volume 13, Number 4, November 2017
- Sunkyung Rhyu, Sang-Yeob Oh:
Hacking and convergence computing. 239-240 - Sunghyuck Hong:
Secure and light IoT protocol (SLIP) for anti-hacking. 241-247 - GuoZhong Li, Jian Sheng Dai, Eun-Mi Park, Seong-Taek Park:
A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news. 249-255 - Sang-Won Bang, Byeong-Soo Jung, Sang-Cheol Lee:
Research on financial institutional network partition design for anti-hacking. 257-263 - Hak Suh Kim, Sang-Ho Lee:
An evaluation method for secure virtual network embedding algorithms. 265-270 - Yoon-Su Jeong:
Secure information authentication protocol between patients and medical staff in a hospital environment. 271-278 - Hyun Yoo, Joo-Chang Kim, Keon-Woo Kim, Roy C. Park:
Context aware based user customized light therapy service using security framework. 279-288 - Sung-Kyu Park, Song-Ha Lee, Taek-Young Kim, Hyo-Jung Jun, Tae-Sung Kim:
A performance evaluation of information security training in public sector. 289-296 - Sun-Moon Jo:
Secure access policy for efficient resource in mobile computing environment. 297-303 - Sang Un Ahn, Sang Oh Park, Jeong-Heon Kim, Byungyun Kong:
Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment. 305-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.