


default search action
Journal in Computer Virology, Volume 3
Volume 3, Number 1, April 2007
- Guillaume Bonfante, Jean-Yves Marion:

Foreword. 1-2 - Philippe Beaucamps, Eric Filiol

:
On the possibility of practically obfuscating programs towards a unified perspective of code protection. 3-21 - Eric Filiol

, Grégoire Jacob, Mickaël Le Liard:
Evaluation methodology and theoretical model for antiviral behavioural detection strategies. 23-37 - Benjamin Morin, Ludovic Mé:

Intrusion detection and virology: an analysis of differences, similarities and complementariness. 39-49 - Radu State, Olivier Festor:

Malware: a future framework for device, network and service management. 51-60
Volume 3, Number 2, June 2007
- Rainer Fahs, Vlasti Broucek:

Letter from the EICAR Chairman. 61 - Vlasti Broucek, Paul Turner

:
Foreword. 63-64 - Eric Filiol

, Sébastien Josse:
A statistical model for undecidable viral detection. 65-74 - Eric Filiol

:
Formalisation and implementation aspects of K -ary (malicious) codes. 75-86 - Markos Avlonitis

, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
A spatial stochastic model for worm propagation: scale effects. 87-92 - Attila Ondi, Richard Ford:

How good is good enough? Metrics for worm/anti-worm evaluation. 93-101 - Vinoo Thomas, Nitin Jyoti:

Bot countermeasures. 103-111 - Sébastien Josse:

Rootkit detection from outside the Matrix. 113-123 - Gerald Tripp:

Regular expression matching with input compression: a hardware design for use within network intrusion detection systems. 125-134 - Jörg Preuß, Steven Furnell

, Maria Papadaki
:
Considering the potential of criminal profiling to combat hacking. 135-141 - Lizzie Coles-Kemp, Richard E. Overill:

On the role of the Facilitator in information security risk assessment. 143-148 - Urs E. Gattiker:

Bologna process revisited: educating information security and malware experts. 149-161 - Linfeng Li, Marko Helenius

:
Usability evaluation of anti-phishing toolbars. 163-184 - Oliver Jorns, Oliver Jung, Gerald Quirchmayr:

Transaction pseudonyms in mobile environments. 185-194
Volume 3, Number 3, August 2007
- Hervé Debar

, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:
Enabling automated threat response through the use of a dynamic security policy. 195-210 - Chandra Prakash:

B-tree with fixed node size and no minimum degree. 211-219 - Sébastien Josse:

Secure and advanced unpacking using computer emulation. 221-236 - Alok Sharma

, Kuldip K. Paliwal
:
Detecting masquerades using a combination of Naïve Bayes and weighted RBF approach. 237-245
Volume 3, Number 4, November 2007
- Anne Bonfante, Jean-Yves Marion:

On the defence notion. 247-251 - Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith:

Software transformations to improve malware detection. 253-265 - Salima Hacini, Zahia Guessoum, Zizette Boufaïda:

TAMAP: a new trust-based approach for mobile agent protection. 267-283 - Daniel Bilar

:
On callgraphs and generative mechanisms. 285-297 - Daniel Bilar:

On callgraphs and generative mechanisms. 299-310

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














