![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Computer Virology and Hacking Techniques, Volume 19
Volume 19, Number 1, March 2023
- Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, Mark Stamp
:
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. 1-16 - Mariapia Raimondo, Simona Bernardi, Stefano Marrone
, José Merseguer:
An approach for the automatic verification of blockchain protocols: the Tweetchain case study. 17-32 - Gianpiero Costantino
, Ilaria Matteucci
:
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities. 33-49 - Saeed Azizpour, MohammadReza Majma
:
NADA: new architecture for detecting DoS and DDoS attacks in fog computing. 51-64 - Alejandro Guerra-Manzanares
, Hayretdin Bahsi, Marcin Luckner:
Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection. 65-96 - Alvaro Chysi, Stavros D. Nikolopoulos
, Iosif Polenakis:
Detection and classification of malicious software utilizing Max-Flows between system-call groups. 97-123 - Maxim O. Kalinin
, Vasiliy M. Krundyshev:
Security intrusion detection using quantum machine learning techniques. 125-136 - Sina Tamjidi, Alireza Shameli-Sendi
:
Intelligence in security countermeasures selection. 137-148
Volume 19, Number 2, June 2023
- Shun Yonamine
, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto:
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware. 149-163 - Ander Granado Masid, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo
:
Application of the SAMA methodology to Ryuk malware. 165-198 - (Withdrawn) Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. 199-215
- Swetha Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas
, N. Balakrishnan:
XAI for intrusion detection system: comparing explanations based on global and local scope. 217-239 - (Withdrawn) Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM. 241-255
- (Withdrawn) Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. 257-269
- Hashem Hashemi, Mohammad Ebrahim Samie
, Ali Hamzeh
:
IFMD: image fusion for malware detection. 271-286 - Alireza Sadeghi-Nasab
, Vahid Rafe
:
A comprehensive review of the security flaws of hashing algorithms. 287-302 - Meysam Ghahramani
, Reza Javidan:
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks. 303-317 - Chariton Karamitas, Athanasios Kehagias:
Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study. 319-337
Volume 19, Number 3, September 2023
- Vladimir M. Fomichev, Alisa M. Koreneva
:
Editorial special issue: Russian research in cybersecurity. 339-340 - Anna Epishkina
, Nikolay Karapetyants, Konstantin Kogos
, Philip Lebedev:
Covert channel limitation via special dummy traffic generating. 341-349 - Mark Ermolov, Dmitry Sklyarov, Maxim Goryachy
:
Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors. 351-365 - Nina D. Ivanova
, Vitaliy G. Ivanenko:
Modeling advanced persistent threats using risk matrix methods. 367-372 - Julia Bobrysheva, Sergey Zapechnikov
:
Post-quantum security of messengers: secure group chats and continuous key distribution protocols. 373-380 - Aleksei Kirov
, Valerii Sizov
:
Development of a method for targeted monitoring and processing of information security incidents of economic entities. 381-386 - G. S. Ponomarenko
, P. G. Klyucharev
:
On improvements of robustness of obfuscated JavaScript code detection. 387-398 - Evgeniy Y. Pavlenko
, K. V. Vasil'eva, Daria S. Lavrova, Dmitry P. Zegzhda:
Counteraction the cybersecurity threats of the in-vehicle local network. 399-408 - Nikolay Karapetyants, Dmitry Efanov
:
A practical approach to learning Linux vulnerabilities. 409-418 - Dmitriy Izergin
, Mikhail Eremeev, Shamil Magomedov:
Risky model of mobile application presentation. 419-441 - Anatoly Konkin, Sergey Zapechnikov
:
Zero knowledge proof and ZK-SNARK for private blockchains. 443-449 - Maria A. Poltavtseva
, Elena B. Aleksandrova
, Vadim S. Shmatov
, Peter D. Zegzhda
:
Data protection in heterogeneous big data systems. 451-458 - Anastasia Pereberina
, Alexey Kostyushko, Alexander Tormasov:
An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis. 459-468
Volume 19, Number 4, November 2023
- Mouaad Mohy-Eddine
, Azidine Guezzaz, Said Benkirane, Mourade Azrour
:
An effective intrusion detection approach based on ensemble learning for IIoT edge computing. 469-481 - Yoshihiro Oyama
, Hirotaka Kokubo:
Forced continuation of malware execution beyond exceptions. 483-501 - Enrique Soriano-Salvador
, Gorka Guardiola Muzquiz
:
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation. 503-513 - Mahdi Mahdavi Oliaee, Zahra Ahmadian
:
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits. 515-528 - Baijnath Kaushik, Reya Sharma, Kulwant Dhama, Akshma Chadha
, Surbhi Sharma:
Performance evaluation of learning models for intrusion detection system using feature selection. 529-548 - Manmeet Singh
, Maninder Singh, Sanmeet Kaur:
Identifying bot infection using neural networks on DNS traffic. 549-563 - Leslie F. Sikos
, Craig Valli
, Alexander E. Grojek
, David J. Holmes
, Samuel G. Wakeling
, Warren Z. Cabral
, Nickson M. Karie
:
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception. 565-577 - Huy Nguyen, Fabio Di Troia, Genya Ishigaki
, Mark Stamp
:
Generative adversarial networks and image-based malware classification. 579-595 - Manar Aldaoud
, Dawood Al-Abri
, Ahmed Al-Maashri
, Firdous Kausar
:
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach. 597-614 - Puya Pakshad
, Alireza Shameli-Sendi
, Behzad Khalaji Emamzadeh Abbasi:
A security vulnerability predictor based on source code metrics. 615-633 - Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. 635
- Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM. 637
- Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. 639
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.