


default search action
Journal in Computer Virology, Volume 2
Volume 2, Number 1, August 2006
- Vlasti Broucek, Eric Filiol

, Paul Turner
:
Foreword. 1-2 - Vlasti Broucek

, Paul Turner
:
Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research. 3-12 - Sarah Gordon, Richard Ford:

On the definition and classification of cybercrime. 13-20 - Gerald Tripp:

A Parallel "String Matching Engine" for use in High Speed Network Intrusion Detection Systems. 21-34 - Eric Filiol

:
Malware Pattern Scanning Schemes Secure Against Black-box Analysis. 35-50 - Sébastien Josse:

How to Assess the Effectiveness of your Anti-virus? 51-65 - Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda:

Dynamic Analysis of Malicious Code. 67-77 - John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.:

Anti-disassembly using Cryptographic Hash Functions. 79-85 - Baris Kayayurt, Tugkan Tuglular

:
End-to-end security implementation for mobile devices using TLS protocol. 87-97
Volume 2, Number 2, November 2006
- Eric Filiol

:
Foreword. 99 - Daniel Reynaud-Plantey:

The Java Mobile Risk. 101-107 - Sampo Töyssy, Marko Helenius

:
About malicious software in smartphones. 109-119 - Christos Xenakis

:
Malicious actions against the GPRS technology. 121-133 - Jose Andre Morales

, Peter J. Clarke
, Yi Deng, B. M. Golam Kibria
:
Testing and evaluating virus detectors for handheld devices. 135-147
Volume 2, Number 3, December 2006
- Matt Webster

, Grant Malcolm:
Detection of metamorphic computer viruses using algebraic specification. 149-161 - InSeon Yoo, Ulrich Ultes-Nitsche

:
Non-signature based virus detection. 163-186 - David de Drézigué, Jean-Paul Fizaine, Nils Hansma:

In-depth analysis of the viral threats with OpenOffice.org documents. 187-210 - Wing Wong, Mark Stamp

:
Hunting for metamorphic engines. 211-229 - Krishna Sandeep Reddy Dubba, Arun K. Pujari:

N-gram analysis for computer virus detection. 231-239
Volume 2, Number 4, February 2007
- Eric Filiol

, Roland Büschkes, Pavel Laskov:
Foreword. 241-242 - Konrad Rieck, Pavel Laskov:

Language models for detection of unknown attacks in network traffic. 243-256 - Michalis Polychronakis, Kostas G. Anagnostakis

, Evangelos P. Markatos:
Network-level polymorphic shellcode detection using emulation. 257-274 - André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:

Using a virtual security testbed for digital forensic reconstruction. 275-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














