Search dblp for Publications

export results for "toc:db/journals/virology/virology7.bht:"

 download as .bib file

@article{DBLP:journals/virology/AhmedL11,
  author       = {Irfan Ahmed and
                  Kyung{-}suk Lhee},
  title        = {Classification of packet contents for malware detection},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {4},
  pages        = {279--295},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-011-0156-6},
  doi          = {10.1007/S11416-011-0156-6},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/AhmedL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AndersonQNSL11,
  author       = {Blake Anderson and
                  Daniel Quist and
                  Joshua Neil and
                  Curtis B. Storlie and
                  Terran Lane},
  title        = {Graph-based malware detection using dynamic analysis},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {4},
  pages        = {247--258},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-011-0152-x},
  doi          = {10.1007/S11416-011-0152-X},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AndersonQNSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AshfaqAK11,
  author       = {Ayesha Binte Ashfaq and
                  Muhammad Qasim Ali and
                  Syed Ali Khayam},
  title        = {Accuracy improving guidelines for network anomaly detection systems},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {1},
  pages        = {63--81},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-009-0133-5},
  doi          = {10.1007/S11416-009-0133-5},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AshfaqAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BroucekTZ11,
  author       = {Vlasti Broucek and
                  Paul Turner and
                  Mark Zimmerli},
  title        = {Managing university internet access: balancing the need for security,
                  privacy and digital evidence},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {3},
  pages        = {189--199},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0147-z},
  doi          = {10.1007/S11416-010-0147-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BroucekTZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DesfossezDG11,
  author       = {Julien Desfossez and
                  Justine Dieppedale and
                  Gabriel Girard},
  title        = {Stealth malware analysis from kernel space with Kolumbo},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {1},
  pages        = {83--93},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-009-0139-z},
  doi          = {10.1007/S11416-009-0139-Z},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/DesfossezDG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DesnosFL11,
  author       = {Anthony Desnos and
                  Eric Filiol and
                  Ivan Lefou},
  title        = {Detecting (and creating !) a {HVM} rootkit (aka BluePill-like)},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {1},
  pages        = {23--49},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-009-0130-8},
  doi          = {10.1007/S11416-009-0130-8},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/DesnosFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EgeleKP11,
  author       = {Manuel Egele and
                  Clemens Kolbitsch and
                  Christian Platzer},
  title        = {Removing web spam links from search engine results},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {1},
  pages        = {51--62},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-009-0132-6},
  doi          = {10.1007/S11416-009-0132-6},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/EgeleKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/GengOKO11,
  author       = {Dai Geng and
                  Tomohiro Odaka and
                  Jousuke Kuroiwa and
                  Hisakazu Ogura},
  title        = {An \emph{N}-Gram and {STF-IDF} model for masquerade detection in a
                  {UNIX} environment},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {2},
  pages        = {133--142},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0143-3},
  doi          = {10.1007/S11416-010-0143-3},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/GengOKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KhanMK11,
  author       = {Hassan Khan and
                  Fauzan Mirza and
                  Syed Ali Khayam},
  title        = {Determining malicious executable distinguishing attributes and low-complexity
                  detection},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {2},
  pages        = {95--105},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0140-6},
  doi          = {10.1007/S11416-010-0140-6},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KhanMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KhayamAR11,
  author       = {Syed Ali Khayam and
                  Ayesha Binte Ashfaq and
                  Hayder Radha},
  title        = {Joint network-host based malware detection using information-theoretic
                  tools},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {2},
  pages        = {159--172},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0145-1},
  doi          = {10.1007/S11416-010-0145-1},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KhayamAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KinableK11,
  author       = {Joris Kinable and
                  Orestis Kostakis},
  title        = {Malware classification based on call graph clustering},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {4},
  pages        = {233--245},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-011-0151-y},
  doi          = {10.1007/S11416-011-0151-Y},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KinableK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LacombeND11,
  author       = {{\'{E}}ric Lacombe and
                  Vincent Nicomette and
                  Yves Deswarte},
  title        = {Enforcing kernel constraints by hardware-assisted virtualization},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {1},
  pages        = {1--21},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-009-0129-1},
  doi          = {10.1007/S11416-009-0129-1},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LacombeND11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LinS11,
  author       = {Da Lin and
                  Mark Stamp},
  title        = {Hunting for undetectable metamorphic viruses},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {3},
  pages        = {201--214},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0148-y},
  doi          = {10.1007/S11416-010-0148-Y},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/LinS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/NicometteKAH11,
  author       = {Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata and
                  Matthieu Herrb},
  title        = {Set-up and deployment of a high-interaction honeypot: experiment and
                  lessons learned},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {2},
  pages        = {143--157},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0144-2},
  doi          = {10.1007/S11416-010-0144-2},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/NicometteKAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/QuistLN11,
  author       = {Daniel Quist and
                  Lorie M. Liebrock and
                  Joshua Neil},
  title        = {Improving antivirus accuracy with hypervisor assisted analysis},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {2},
  pages        = {121--131},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0142-4},
  doi          = {10.1007/S11416-010-0142-4},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/QuistLN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ShankarapaniRMM11,
  author       = {Madhu K. Shankarapani and
                  Subbu Ramamoorthy and
                  Ram S. Movva and
                  Srinivas Mukkamala},
  title        = {Malware detection using assembly and {API} call sequences},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {2},
  pages        = {107--119},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0141-5},
  doi          = {10.1007/S11416-010-0141-5},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ShankarapaniRMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Sorokin11,
  author       = {Ivan Sorokin},
  title        = {Comparing files using structural entropy},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {4},
  pages        = {259--265},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-011-0153-9},
  doi          = {10.1007/S11416-011-0153-9},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Sorokin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/SutherlandDB11,
  author       = {Iain Sutherland and
                  Gareth Davies and
                  Andrew Blyth},
  title        = {Malware and steganography in hard disk firmware},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {3},
  pages        = {215--219},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0149-x},
  doi          = {10.1007/S11416-010-0149-X},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/SutherlandDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/WagenerSDE11,
  author       = {G{\'{e}}rard Wagener and
                  Radu State and
                  Alexandre Dulaunoy and
                  Thomas Engel},
  title        = {Heliza: talking dirty to the attackers},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {3},
  pages        = {221--232},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0150-4},
  doi          = {10.1007/S11416-010-0150-4},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/WagenerSDE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/YounanPPJLW11,
  author       = {Yves Younan and
                  Pieter Philippaerts and
                  Frank Piessens and
                  Wouter Joosen and
                  Sven Lachmund and
                  Thomas Walter},
  title        = {Filter-resistant code injection on {ARM}},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {3},
  pages        = {173--188},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-010-0146-0},
  doi          = {10.1007/S11416-010-0146-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/YounanPPJLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ZhangQ11,
  author       = {FuYong Zhang and
                  DeYu Qi},
  title        = {Run-time malware detection based on positive selection},
  journal      = {J. Comput. Virol.},
  volume       = {7},
  number       = {4},
  pages        = {267--277},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11416-011-0154-8},
  doi          = {10.1007/S11416-011-0154-8},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ZhangQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics