![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Journal of Computer Virology and Hacking Techniques, Volume 17
Volume 17, Number 1, March 2021
- Daniel Ricardo dos Santos, Mario Dagrada, Elisa Costante:
Leveraging operational technology and the Internet of things to attack smart buildings. 1-20 - Mamta, Brij B. Gupta
:
An attribute-based keyword search for m-Health networks. 21-36 - Aleksandra V. Markelova
:
Embedding asymmetric backdoors into the RSA key generator. 37-46 - Krzysztof Wawryn
, Patryk Widulinski
:
Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method. 47-59 - Zahian Ismail
, Aman Jantan, Mohd Najwadi Yusoff, Muhammad Ubale Kiru:
The effects of feature selection on the classification of encrypted botnet. 61-74 - Rizwan Ur Rahman, Deepak Singh Tomar:
Threats of price scraping on e-commerce websites: attack model and its detection using neural network. 75-89
Volume 17, Number 2, June 2021
- Mathilde Venault
, Baptiste David:
Superfetch: the famous unknown spy. 91-104 - François Plumerault, Baptiste David:
DBI, debuggers, VM: gotta catch them all. 105-117 - Manar Aldaoud
, Dawood Al-Abri
, Ahmed Al-Maashri, Firdous Kausar
:
DHCP attacking tools: an analysis. 119-129 - Hejun Xu, Binkai Jiang:
Study on a security intelligence trading platform based on blockchain and IPFS. 131-137 - Francesco Mercaldo
, Antonella Santone:
Audio signal processing for Android malware detection and family identification. 139-152 - Yunchun Zhang
, Haorui Li, Yang Zheng, Shaowen Yao, Jiaqi Jiang:
Enhanced DNNs for malware classification with GAN-based adversarial training. 153-163
Volume 17, Number 3, September 2021
- Antonella Santone:
Editorial. 165-166 - Marco Campion
, Mila Dalla Preda, Roberto Giacobazzi:
Learning metamorphic malware signatures from samples. 167-183 - Baptiste David, Maxence Delong, Eric Filiol:
Detection of crawler traps: formalization and implementation - defeating protection on internet and on the TOR network. 185-198 - Joanna Moubarak
, Eric Filiol, Maroun Chamoun:
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes. 199-220 - Francesco Mercaldo
:
A framework for supporting ransomware detection and prevention based on hybrid analysis. 221-227 - Mark Vella
, Christian Colombo
, Robert Abela
, Peter Spacek
:
RV-TEE: secure cryptographic protocol execution based on runtime verification. 229-248 - Cinzia Bernardeschi
, Gianluca Dini
, Maurizio Palmieri
, Francesco Racciatti
:
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks. 249-263
Volume 17, Number 4, December 2021
- Alireza Shameli-Sendi
:
Understanding Linux kernel vulnerabilities. 265-278 - Niccolò Marastoni
, Roberto Giacobazzi, Mila Dalla Preda:
Data augmentation and transfer learning to classify malware images in a deep learning context. 279-297 - Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, Kshitij Pradeep Gupta, Aarti Amod Agarkar
:
Signature-less ransomware detection and mitigation. 299-306 - Soodeh Hosseini, Ali Emamali Nezhad, Hossein Seilani:
Android malware classification using convolutional neural network and LSTM. 307-318 - Hadis Ghanei
, Farnoush Manavi, Ali Hamzeh
:
A novel method for malware detection based on hardware events using deep neural networks. 319-331 - Varshini Reddy, Naimisha Kolli, Balakrishnan Narayanaswamy
:
Malware detection and classification using community detection and social network analysis. 333-346
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.