Search dblp for Publications

export results for "toc:db/journals/virology/virology4.bht:"

 download as .bib file

@article{DBLP:journals/virology/AiacheHLT08,
  author       = {Herv{\'{e}} A{\"{\i}}ache and
                  Fran{\c{c}}ois Haettel and
                  Laure Lebrun and
                  C{\'{e}}dric Tavernier},
  title        = {Improving security and performance of an Ad Hoc network through a
                  multipath routing strategy},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {4},
  pages        = {267--278},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0072-y},
  doi          = {10.1007/S11416-007-0072-Y},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AiacheHLT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AlataANOK08,
  author       = {Eric Alata and
                  Ion Alberdi and
                  Vincent Nicomette and
                  Philippe Owezarski and
                  Mohamed Ka{\^{a}}niche},
  title        = {Internet attacks monitoring with dynamic connection redirection mechanisms},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {2},
  pages        = {127--136},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0067-8},
  doi          = {10.1007/S11416-007-0067-8},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AlataANOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AllamigeonH08,
  author       = {Xavier Allamigeon and
                  Charles Hymans},
  title        = {Static analysis by abstract interpretation: application to the detection
                  of heap overflows},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {1},
  pages        = {5--23},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0063-z},
  doi          = {10.1007/S11416-007-0063-Z},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AllamigeonH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BarrCM08,
  author       = {Stanley J. Barr and
                  Samuel J. Cardman and
                  David M. Martin},
  title        = {A boosting ensemble for the recognition of code sharing in malware},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {4},
  pages        = {335--345},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0087-z},
  doi          = {10.1007/S11416-008-0087-Z},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BarrCM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BiondiF08,
  author       = {Philippe Biondi and
                  Eric Filiol},
  title        = {Foreword},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {1},
  pages        = {1--3},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0073-x},
  doi          = {10.1007/S11416-007-0073-X},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BiondiF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BorelloM08,
  author       = {Jean{-}Marie Borello and
                  Ludovic M{\'{e}}},
  title        = {Code obfuscation techniques for metamorphic viruses},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {211--220},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0084-2},
  doi          = {10.1007/S11416-008-0084-2},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BorelloM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ButtiT08,
  author       = {Laurent Butti and
                  Julien Tinn{\'{e}}s},
  title        = {Discovering and exploiting 802.11 wireless driver vulnerabilities},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {1},
  pages        = {25--37},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0065-x},
  doi          = {10.1007/S11416-007-0065-X},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ButtiT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DucK08,
  author       = {Guillaume Duc and
                  Ronan Keryell},
  title        = {Improving virus protection with an efficient secure architecture with
                  memory encryption, integrity and information leakage protection},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {2},
  pages        = {101--113},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0062-0},
  doi          = {10.1007/S11416-007-0062-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/DucK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Duverger08,
  author       = {St{\'{e}}phane Duverger},
  title        = {Linux 2.6 kernel exploits},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {1},
  pages        = {39--60},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0066-9},
  doi          = {10.1007/S11416-007-0066-9},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Duverger08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/FeilN08,
  author       = {Renaud Feil and
                  Louis Nyffenegger},
  title        = {Evolution of cross site request forgery attacks},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {1},
  pages        = {61--71},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0068-7},
  doi          = {10.1007/S11416-007-0068-7},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/FeilN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Filiol08,
  author       = {Eric Filiol},
  title        = {Editorial},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {159--160},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0083-3},
  doi          = {10.1007/S11416-008-0083-3},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Filiol08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JacobDF08,
  author       = {Gr{\'{e}}goire Jacob and
                  Herv{\'{e}} Debar and
                  Eric Filiol},
  title        = {Behavioral detection of malware: from a survey towards an established
                  taxonomy},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {251--266},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0086-0},
  doi          = {10.1007/S11416-008-0086-0},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JacobDF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JacobFD08,
  author       = {Gr{\'{e}}goire Jacob and
                  Eric Filiol and
                  Herv{\'{e}} Debar},
  title        = {Malware as interaction machines: a new framework for behavior modelling},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {235--250},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0085-1},
  doi          = {10.1007/S11416-008-0085-1},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JacobFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Johns08,
  author       = {Martin Johns},
  title        = {On JavaScript Malware and related threats},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {161--178},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0076-7},
  doi          = {10.1007/S11416-007-0076-7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Johns08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JungMP08,
  author       = {Jaeyeon Jung and
                  Rodolfo A. Milito and
                  Vern Paxson},
  title        = {On the adaptive real-time detection of fast-propagating network worms},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {197--210},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0080-y},
  doi          = {10.1007/S11416-007-0080-Y},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/JungMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LacombeRN08,
  author       = {{\'{E}}ric Lacombe and
                  Fr{\'{e}}d{\'{e}}ric Raynal and
                  Vincent Nicomette},
  title        = {Rootkit modeling and experiments under Linux},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {2},
  pages        = {137--157},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0069-6},
  doi          = {10.1007/S11416-007-0069-6},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LacombeRN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Lagadec08,
  author       = {Philippe Lagadec},
  title        = {OpenDocument and Open {XML} security (OpenOffice.org and {MS} Office
                  2007)},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {2},
  pages        = {115--125},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0060-2},
  doi          = {10.1007/S11416-007-0060-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Lagadec08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LouwLV08,
  author       = {Mike Ter Louw and
                  Jin Soon Lim and
                  V. N. Venkatakrishnan},
  title        = {Enhancing web browser security against malware extensions},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {179--195},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0078-5},
  doi          = {10.1007/S11416-007-0078-5},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LouwLV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Marechal08,
  author       = {Simon Marechal},
  title        = {Advances in password cracking},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {1},
  pages        = {73--81},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0064-y},
  doi          = {10.1007/S11416-007-0064-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Marechal08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MoralesCDK08,
  author       = {Jose Andre Morales and
                  Peter J. Clarke and
                  Yi Deng and
                  B. M. Golam Kibria},
  title        = {Characterization of virus replication},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {3},
  pages        = {221--234},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0077-6},
  doi          = {10.1007/S11416-007-0077-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/MoralesCDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Ruff08,
  author       = {Nicolas Ruff},
  title        = {Windows memory forensics},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {2},
  pages        = {83--100},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0070-0},
  doi          = {10.1007/S11416-007-0070-0},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Ruff08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SulaimanMS08,
  author       = {Anthonius Sulaiman and
                  Srinivas Mukkamala and
                  Andrew H. Sung},
  title        = {{SQL} infections through {RFID}},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {4},
  pages        = {347--356},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0075-8},
  doi          = {10.1007/S11416-007-0075-8},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/SulaimanMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/WagenerSD08,
  author       = {G{\'{e}}rard Wagener and
                  Radu State and
                  Alexandre Dulaunoy},
  title        = {Malware behaviour analysis},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {4},
  pages        = {279--287},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0074-9},
  doi          = {10.1007/S11416-007-0074-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/WagenerSD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/WalensteinMCL08,
  author       = {Andrew Walenstein and
                  Rachit Mathur and
                  Mohamed R. Chouchane and
                  Arun Lakhotia},
  title        = {Constructing malware normalizers using term rewriting},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {4},
  pages        = {307--322},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0081-5},
  doi          = {10.1007/S11416-008-0081-5},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/WalensteinMCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/WebsterM08,
  author       = {Matt Webster and
                  Grant Malcolm},
  title        = {Formal affordance-based models of computer virus reproduction},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {4},
  pages        = {289--306},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-007-0079-4},
  doi          = {10.1007/S11416-007-0079-4},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/WebsterM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/YeWLYJ08,
  author       = {Yanfang Ye and
                  Dingding Wang and
                  Tao Li and
                  Dongyi Ye and
                  Qingshan Jiang},
  title        = {An intelligent PE-malware detection system based on association mining},
  journal      = {J. Comput. Virol.},
  volume       = {4},
  number       = {4},
  pages        = {323--334},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11416-008-0082-4},
  doi          = {10.1007/S11416-008-0082-4},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/YeWLYJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics