default search action
Journal of Computer Virology and Hacking Techniques, Volume 15
Volume 15, Number 1, March 2019
- Hashem Hashemi, Ali Hamzeh:
Visual malware detection using local malicious pattern. 1-14 - Daniel Gibert, Carles Mateu, Jordi Planes, Ramon Vicens:
Using convolutional neural networks for classification of malware represented as images. 15-28 - Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar:
Analysis of ResNet and GoogleNet models for malware detection. 29-37 - Rory Duncan, Z. Cliffe Schreuders:
Security implications of running windows software on a Linux system using Wine: a malware analysis study. 39-60 - Yann Bachy, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
Smart-TV security: risk analysis and experiments on Smart-TV communication channels. 61-76
Volume 15, Number 2, June 2019
- Mehrdad Farrokhmanesh, Ali Hamzeh:
Music classification as a new approach for malware detection. 77-96 - Aditya Raghavan, Fabio Di Troia, Mark Stamp:
Hidden Markov models with random restarts versus boosting for malware detection. 97-107 - Peter Eder-Neuhauser, Tanja Zseby, Joachim Fabini:
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types. 109-125 - S. L. Shiva Darshan, C. D. Jaidhar:
Windows malware detection system based on LSVC recommended hybrid features. 127-146
Volume 15, Number 3, September 2019
- Supraja Suresh, Fabio Di Troia, Katerina Potika, Mark Stamp:
An analysis of Android adware. 147-160 - Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero:
Security of controlled manufacturing systems in the connected factory: the case of industrial robots. 161-175 - Razieh Eskandari, Mahdi Shajari, Mojtaba Mostafavi Ghahfarokhi:
ERES: an extended regular expression signature for polymorphic worm detection. 177-194 - Yeong Tyng Ling, Nor Fazlida Mohd Sani, Mohd Taufik Abdullah, Nor Asilah Wati Abdul Hamid:
Nonnegative matrix factorization and metamorphic malware detection. 195-208 - Abhishek Kumar Singh, C. D. Jaidhar, Ajay Kumara M. A.:
Experimental analysis of Android malware detection based on combinations of permissions and API-calls. 209-218 - A. V. Kozachok, S. A. Kopylov, Alexander Alexandrovich Shelupanov, Oleg Evsutin:
Text marking approach for data leakage prevention. 219-232
Volume 15, Number 4, December 2019
- Marcus Botacin, Paulo Lício de Geus, André Grégio:
"VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks. 233-247 - Duy-Phuc Pham, Duc-Ly Vu, Fabio Massacci:
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques. 249-257 - Jinpeng Wei, Feng Zhu:
Binary-centric defense of production operating systems against kernel queue injection attacks. 259-275 - Tooska Dargahi, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti, Giuseppe Bianchi, Loris Benedetto:
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features. 277-305 - Chariton Karamitas, Athanasios Kehagias:
Function matching between binary executables: efficient algorithms and features. 307-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.