Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/virology/virology7.bht:"
@article{DBLP:journals/virology/AhmedL11, author = {Irfan Ahmed and Kyung{-}suk Lhee}, title = {Classification of packet contents for malware detection}, journal = {J. Comput. Virol.}, volume = {7}, number = {4}, pages = {279--295}, year = {2011}, url = {https://doi.org/10.1007/s11416-011-0156-6}, doi = {10.1007/S11416-011-0156-6}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/AhmedL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AndersonQNSL11, author = {Blake Anderson and Daniel Quist and Joshua Neil and Curtis B. Storlie and Terran Lane}, title = {Graph-based malware detection using dynamic analysis}, journal = {J. Comput. Virol.}, volume = {7}, number = {4}, pages = {247--258}, year = {2011}, url = {https://doi.org/10.1007/s11416-011-0152-x}, doi = {10.1007/S11416-011-0152-X}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AndersonQNSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AshfaqAK11, author = {Ayesha Binte Ashfaq and Muhammad Qasim Ali and Syed Ali Khayam}, title = {Accuracy improving guidelines for network anomaly detection systems}, journal = {J. Comput. Virol.}, volume = {7}, number = {1}, pages = {63--81}, year = {2011}, url = {https://doi.org/10.1007/s11416-009-0133-5}, doi = {10.1007/S11416-009-0133-5}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AshfaqAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BroucekTZ11, author = {Vlasti Broucek and Paul Turner and Mark Zimmerli}, title = {Managing university internet access: balancing the need for security, privacy and digital evidence}, journal = {J. Comput. Virol.}, volume = {7}, number = {3}, pages = {189--199}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0147-z}, doi = {10.1007/S11416-010-0147-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BroucekTZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DesfossezDG11, author = {Julien Desfossez and Justine Dieppedale and Gabriel Girard}, title = {Stealth malware analysis from kernel space with Kolumbo}, journal = {J. Comput. Virol.}, volume = {7}, number = {1}, pages = {83--93}, year = {2011}, url = {https://doi.org/10.1007/s11416-009-0139-z}, doi = {10.1007/S11416-009-0139-Z}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/DesfossezDG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DesnosFL11, author = {Anthony Desnos and Eric Filiol and Ivan Lefou}, title = {Detecting (and creating !) a {HVM} rootkit (aka BluePill-like)}, journal = {J. Comput. Virol.}, volume = {7}, number = {1}, pages = {23--49}, year = {2011}, url = {https://doi.org/10.1007/s11416-009-0130-8}, doi = {10.1007/S11416-009-0130-8}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/DesnosFL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/EgeleKP11, author = {Manuel Egele and Clemens Kolbitsch and Christian Platzer}, title = {Removing web spam links from search engine results}, journal = {J. Comput. Virol.}, volume = {7}, number = {1}, pages = {51--62}, year = {2011}, url = {https://doi.org/10.1007/s11416-009-0132-6}, doi = {10.1007/S11416-009-0132-6}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/EgeleKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/GengOKO11, author = {Dai Geng and Tomohiro Odaka and Jousuke Kuroiwa and Hisakazu Ogura}, title = {An \emph{N}-Gram and {STF-IDF} model for masquerade detection in a {UNIX} environment}, journal = {J. Comput. Virol.}, volume = {7}, number = {2}, pages = {133--142}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0143-3}, doi = {10.1007/S11416-010-0143-3}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/GengOKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KhanMK11, author = {Hassan Khan and Fauzan Mirza and Syed Ali Khayam}, title = {Determining malicious executable distinguishing attributes and low-complexity detection}, journal = {J. Comput. Virol.}, volume = {7}, number = {2}, pages = {95--105}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0140-6}, doi = {10.1007/S11416-010-0140-6}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KhanMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KhayamAR11, author = {Syed Ali Khayam and Ayesha Binte Ashfaq and Hayder Radha}, title = {Joint network-host based malware detection using information-theoretic tools}, journal = {J. Comput. Virol.}, volume = {7}, number = {2}, pages = {159--172}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0145-1}, doi = {10.1007/S11416-010-0145-1}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KhayamAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KinableK11, author = {Joris Kinable and Orestis Kostakis}, title = {Malware classification based on call graph clustering}, journal = {J. Comput. Virol.}, volume = {7}, number = {4}, pages = {233--245}, year = {2011}, url = {https://doi.org/10.1007/s11416-011-0151-y}, doi = {10.1007/S11416-011-0151-Y}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KinableK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LacombeND11, author = {{\'{E}}ric Lacombe and Vincent Nicomette and Yves Deswarte}, title = {Enforcing kernel constraints by hardware-assisted virtualization}, journal = {J. Comput. Virol.}, volume = {7}, number = {1}, pages = {1--21}, year = {2011}, url = {https://doi.org/10.1007/s11416-009-0129-1}, doi = {10.1007/S11416-009-0129-1}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LacombeND11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LinS11, author = {Da Lin and Mark Stamp}, title = {Hunting for undetectable metamorphic viruses}, journal = {J. Comput. Virol.}, volume = {7}, number = {3}, pages = {201--214}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0148-y}, doi = {10.1007/S11416-010-0148-Y}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/LinS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/NicometteKAH11, author = {Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata and Matthieu Herrb}, title = {Set-up and deployment of a high-interaction honeypot: experiment and lessons learned}, journal = {J. Comput. Virol.}, volume = {7}, number = {2}, pages = {143--157}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0144-2}, doi = {10.1007/S11416-010-0144-2}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/NicometteKAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/QuistLN11, author = {Daniel Quist and Lorie M. Liebrock and Joshua Neil}, title = {Improving antivirus accuracy with hypervisor assisted analysis}, journal = {J. Comput. Virol.}, volume = {7}, number = {2}, pages = {121--131}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0142-4}, doi = {10.1007/S11416-010-0142-4}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/QuistLN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ShankarapaniRMM11, author = {Madhu K. Shankarapani and Subbu Ramamoorthy and Ram S. Movva and Srinivas Mukkamala}, title = {Malware detection using assembly and {API} call sequences}, journal = {J. Comput. Virol.}, volume = {7}, number = {2}, pages = {107--119}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0141-5}, doi = {10.1007/S11416-010-0141-5}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ShankarapaniRMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Sorokin11, author = {Ivan Sorokin}, title = {Comparing files using structural entropy}, journal = {J. Comput. Virol.}, volume = {7}, number = {4}, pages = {259--265}, year = {2011}, url = {https://doi.org/10.1007/s11416-011-0153-9}, doi = {10.1007/S11416-011-0153-9}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Sorokin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/SutherlandDB11, author = {Iain Sutherland and Gareth Davies and Andrew Blyth}, title = {Malware and steganography in hard disk firmware}, journal = {J. Comput. Virol.}, volume = {7}, number = {3}, pages = {215--219}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0149-x}, doi = {10.1007/S11416-010-0149-X}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/SutherlandDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/WagenerSDE11, author = {G{\'{e}}rard Wagener and Radu State and Alexandre Dulaunoy and Thomas Engel}, title = {Heliza: talking dirty to the attackers}, journal = {J. Comput. Virol.}, volume = {7}, number = {3}, pages = {221--232}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0150-4}, doi = {10.1007/S11416-010-0150-4}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/WagenerSDE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/YounanPPJLW11, author = {Yves Younan and Pieter Philippaerts and Frank Piessens and Wouter Joosen and Sven Lachmund and Thomas Walter}, title = {Filter-resistant code injection on {ARM}}, journal = {J. Comput. Virol.}, volume = {7}, number = {3}, pages = {173--188}, year = {2011}, url = {https://doi.org/10.1007/s11416-010-0146-0}, doi = {10.1007/S11416-010-0146-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/YounanPPJLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ZhangQ11, author = {FuYong Zhang and DeYu Qi}, title = {Run-time malware detection based on positive selection}, journal = {J. Comput. Virol.}, volume = {7}, number = {4}, pages = {267--277}, year = {2011}, url = {https://doi.org/10.1007/s11416-011-0154-8}, doi = {10.1007/S11416-011-0154-8}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ZhangQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.