![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Computer Virology and Hacking Techniques, Volume 15
Volume 15, Number 1, March 2019
- Hashem Hashemi, Ali Hamzeh
:
Visual malware detection using local malicious pattern. 1-14 - Daniel Gibert
, Carles Mateu
, Jordi Planes
, Ramon Vicens:
Using convolutional neural networks for classification of malware represented as images. 15-28 - Riaz Ullah Khan
, Xiaosong Zhang, Rajesh Kumar
:
Analysis of ResNet and GoogleNet models for malware detection. 29-37 - Rory Duncan, Z. Cliffe Schreuders:
Security implications of running windows software on a Linux system using Wine: a malware analysis study. 39-60 - Yann Bachy
, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
Smart-TV security: risk analysis and experiments on Smart-TV communication channels. 61-76
Volume 15, Number 2, June 2019
- Mehrdad Farrokhmanesh, Ali Hamzeh
:
Music classification as a new approach for malware detection. 77-96 - Aditya Raghavan, Fabio Di Troia, Mark Stamp
:
Hidden Markov models with random restarts versus boosting for malware detection. 97-107 - Peter Eder-Neuhauser, Tanja Zseby, Joachim Fabini:
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types. 109-125 - S. L. Shiva Darshan, C. D. Jaidhar:
Windows malware detection system based on LSVC recommended hybrid features. 127-146
Volume 15, Number 3, September 2019
- Supraja Suresh, Fabio Di Troia, Katerina Potika
, Mark Stamp
:
An analysis of Android adware. 147-160 - Marcello Pogliani
, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero
:
Security of controlled manufacturing systems in the connected factory: the case of industrial robots. 161-175 - Razieh Eskandari
, Mahdi Shajari, Mojtaba Mostafavi Ghahfarokhi:
ERES: an extended regular expression signature for polymorphic worm detection. 177-194 - Yeong Tyng Ling, Nor Fazlida Mohd Sani
, Mohd Taufik Abdullah, Nor Asilah Wati Abdul Hamid:
Nonnegative matrix factorization and metamorphic malware detection. 195-208 - Abhishek Kumar Singh, C. D. Jaidhar, Ajay Kumara M. A.:
Experimental analysis of Android malware detection based on combinations of permissions and API-calls. 209-218 - A. V. Kozachok
, S. A. Kopylov, Alexander Alexandrovich Shelupanov
, Oleg Evsutin
:
Text marking approach for data leakage prevention. 219-232
Volume 15, Number 4, December 2019
- Marcus Botacin, Paulo Lício de Geus
, André Grégio
:
"VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks. 233-247 - Duy-Phuc Pham
, Duc Ly Vu
, Fabio Massacci
:
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques. 249-257 - Jinpeng Wei
, Feng Zhu:
Binary-centric defense of production operating systems against kernel queue injection attacks. 259-275 - Tooska Dargahi
, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti
, Giuseppe Bianchi, Loris Benedetto:
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features. 277-305 - Chariton Karamitas, Athanasios Kehagias:
Function matching between binary executables: efficient algorithms and features. 307-323
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.