


default search action
Journal of Computer Virology and Hacking Techniques, Volume 17
Volume 17, Number 1, March 2021
- Daniel Ricardo dos Santos, Mario Dagrada, Elisa Costante:

Leveraging operational technology and the Internet of things to attack smart buildings. 1-20 - Mamta

, Brij B. Gupta
:
An attribute-based keyword search for m-Health networks. 21-36 - Aleksandra V. Markelova

:
Embedding asymmetric backdoors into the RSA key generator. 37-46 - Krzysztof Wawryn

, Patryk Widulinski
:
Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method. 47-59 - Zahian Ismail

, Aman Jantan, Mohd Najwadi Yusoff, Muhammad Ubale Kiru:
The effects of feature selection on the classification of encrypted botnet. 61-74 - Rizwan Ur Rahman, Deepak Singh Tomar

:
Threats of price scraping on e-commerce websites: attack model and its detection using neural network. 75-89
Volume 17, Number 2, June 2021
- Mathilde Venault

, Baptiste David:
Superfetch: the famous unknown spy. 91-104 - François Plumerault, Baptiste David:

DBI, debuggers, VM: gotta catch them all. 105-117 - Manar Aldaoud

, Dawood Al-Abri
, Ahmed Al-Maashri, Firdous Kausar
:
DHCP attacking tools: an analysis. 119-129 - Hejun Xu, Binkai Jiang:

Study on a security intelligence trading platform based on blockchain and IPFS. 131-137 - Francesco Mercaldo

, Antonella Santone:
Audio signal processing for Android malware detection and family identification. 139-152 - Yunchun Zhang

, Haorui Li, Yang Zheng, Shaowen Yao, Jiaqi Jiang:
Enhanced DNNs for malware classification with GAN-based adversarial training. 153-163
Volume 17, Number 3, September 2021
- Antonella Santone:

Editorial. 165-166 - Marco Campion

, Mila Dalla Preda, Roberto Giacobazzi:
Learning metamorphic malware signatures from samples. 167-183 - Baptiste David, Maxence Delong, Eric Filiol

:
Detection of crawler traps: formalization and implementation - defeating protection on internet and on the TOR network. 185-198 - Joanna Moubarak

, Eric Filiol
, Maroun Chamoun:
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes. 199-220 - Francesco Mercaldo

:
A framework for supporting ransomware detection and prevention based on hybrid analysis. 221-227 - Mark Vella

, Christian Colombo
, Robert Abela
, Peter Spacek
:
RV-TEE: secure cryptographic protocol execution based on runtime verification. 229-248 - Cinzia Bernardeschi

, Gianluca Dini
, Maurizio Palmieri
, Francesco Racciatti
:
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks. 249-263
Volume 17, Number 4, December 2021
- Alireza Shameli-Sendi

:
Understanding Linux kernel vulnerabilities. 265-278 - Niccolò Marastoni

, Roberto Giacobazzi, Mila Dalla Preda:
Data augmentation and transfer learning to classify malware images in a deep learning context. 279-297 - Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, Kshitij Pradeep Gupta, Aarti Amod Agarkar

:
Signature-less ransomware detection and mitigation. 299-306 - Soodeh Hosseini, Ali Emamali Nezhad, Hossein Seilani:

Android malware classification using convolutional neural network and LSTM. 307-318 - Hadis Ghanei

, Farnoush Manavi, Ali Hamzeh
:
A novel method for malware detection based on hardware events using deep neural networks. 319-331 - Varshini Reddy, Naimisha Kolli, Balakrishnan Narayanaswamy

:
Malware detection and classification using community detection and social network analysis. 333-346

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














