default search action
Search dblp for Publications
export results for "toc:db/journals/virology/virology11.bht:"
@article{DBLP:journals/virology/AfonsoAGJG15, author = {Vitor Monte Afonso and Matheus Favero de Amorim and Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and Glauco Barroso Junquera and Paulo L{\'{\i}}cio de Geus}, title = {Identifying Android malware using dynamically obtained features}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {1}, pages = {9--17}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0226-7}, doi = {10.1007/S11416-014-0226-7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AfonsoAGJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AlamSTH15, author = {Shahid Alam and Ibrahim Sogukpinar and Issa Traor{\'{e}} and R. Nigel Horspool}, title = {Sliding window and control flow weight for metamorphic malware detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {2}, pages = {75--88}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0222-y}, doi = {10.1007/S11416-014-0222-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/AlamSTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AnnachhatreAS15, author = {Chinmayee Annachhatre and Thomas H. Austin and Mark Stamp}, title = {Hidden Markov models for malware classification}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {2}, pages = {59--73}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0215-x}, doi = {10.1007/S11416-014-0215-X}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/AnnachhatreAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ApvrilleA15, author = {Axelle Apvrille and Ludovic Apvrille}, title = {SherlockDroid: a research assistant to spot unknown malware in Android marketplaces}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {4}, pages = {235--245}, year = {2015}, url = {https://doi.org/10.1007/s11416-015-0245-z}, doi = {10.1007/S11416-015-0245-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ApvrilleA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Choi15, author = {Sung Choi}, title = {Study on model fostering for cloud service brokerage}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {181--192}, year = {2015}, url = {https://doi.org/10.1007/s11416-015-0246-y}, doi = {10.1007/S11416-015-0246-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Choi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Ferrand15, author = {Olivier Ferrand}, title = {How to detect the Cuckoo Sandbox and to Strengthen it?}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {1}, pages = {51--58}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0224-9}, doi = {10.1007/S11416-014-0224-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Ferrand15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/GooL15, author = {Eun{-}Hee Goo and Seung{-}Dae Lee}, title = {Reconfigurable real number field elliptic curve cryptography to improve the security}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {123--128}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0233-8}, doi = {10.1007/S11416-014-0233-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/GooL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Hamon15, author = {Valentin Hamon}, title = {Android botnets for multi-targeted attacks}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {4}, pages = {193--202}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0216-9}, doi = {10.1007/S11416-014-0216-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Hamon15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Hong15, author = {Sunghyuck Hong}, title = {Efficient and secure {DNS} cyber shelter on DDoS attacks}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {129--136}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0230-y}, doi = {10.1007/S11416-014-0230-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Hong15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JeongK15, author = {Yoon{-}Su Jeong and Yong{-}Tae Kim}, title = {A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {137--142}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0236-5}, doi = {10.1007/S11416-014-0236-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/JeongK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JidigamAS15, author = {Ranjith Kumar Jidigam and Thomas H. Austin and Mark Stamp}, title = {Singular value decomposition and metamorphic detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {4}, pages = {203--216}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0220-0}, doi = {10.1007/S11416-014-0220-0}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/JidigamAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/JoC15, author = {Sun{-}Moon Jo and Kyungyong Chung}, title = {An efficient thread partition policy for secure functional language}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {165--171}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0234-7}, doi = {10.1007/S11416-014-0234-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/JoC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KalbhorAFJS15, author = {Ashwin Kalbhor and Thomas H. Austin and Eric Filiol and S{\'{e}}bastien Josse and Mark Stamp}, title = {Dueling hidden Markov models for virus analysis}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {2}, pages = {103--118}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0232-9}, doi = {10.1007/S11416-014-0232-9}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/KalbhorAFJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Kang15, author = {Lachlan Kang}, title = {Efficient botnet herding within the Tor network}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {1}, pages = {19--26}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0229-4}, doi = {10.1007/S11416-014-0229-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Kang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KheirHW15, author = {Nizar Kheir and Xiao Han and Chirine Wolley}, title = {Behavioral fine-grained detection and classification of {P2P} bots}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {4}, pages = {217--233}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0228-5}, doi = {10.1007/S11416-014-0228-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KheirHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KimL15, author = {Jung{-}Hoon Kim and Keun{-}Ho Lee}, title = {Vulnerabilities of intelligent automobiles using {TPEG} update based on {T-DMB} and its countermeasures}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {143--148}, year = {2015}, url = {https://doi.org/10.1007/s11416-015-0243-1}, doi = {10.1007/S11416-015-0243-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KimL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/KumarC15, author = {Diksha Gautam Kumar and Madhumita Chatterjee}, title = {{MAC} based solution for {SQL} injection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {1}, pages = {1--7}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0219-6}, doi = {10.1007/S11416-014-0219-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/KumarC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Lee15, author = {Aeri Lee}, title = {Authentication scheme for smart learning system in the cloud computing environment}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {149--155}, year = {2015}, url = {https://doi.org/10.1007/s11416-015-0240-4}, doi = {10.1007/S11416-015-0240-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/Lee15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LeeI15, author = {Sang Chul Lee and Kwang Hyuk Im}, title = {Banking behavior in security and multi-channel environment}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {157--164}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0235-6}, doi = {10.1007/S11416-014-0235-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LeeI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/MusaleAS15, author = {Mangesh Musale and Thomas H. Austin and Mark Stamp}, title = {Hunting for metamorphic JavaScript malware}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {2}, pages = {89--102}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0225-8}, doi = {10.1007/S11416-014-0225-8}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/MusaleAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/OhGJRH15, author = {Sang{-}Yeob Oh and Supratip Ghose and Yu{-}Keum Jeong and Joong{-}Kyung Ryu and Jung{-}Soo Han}, title = {Convergence security systems}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {119--121}, year = {2015}, url = {https://doi.org/10.1007/s11416-015-0248-9}, doi = {10.1007/S11416-015-0248-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/OhGJRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ShahM15, author = {Sugandh Shah and Babu M. Mehtre}, title = {An overview of vulnerability assessment and penetration testing techniques}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {1}, pages = {27--49}, year = {2015}, url = {https://doi.org/10.1007/s11416-014-0231-x}, doi = {10.1007/S11416-014-0231-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ShahM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ShinYKL15, author = {Sumi Shin and Suhyeon Yoo and Hyesun Kim and Taeseok Lee}, title = {Association analysis of technology convergence based on information system utilization}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {3}, pages = {173--179}, year = {2015}, url = {https://doi.org/10.1007/s11416-015-0238-y}, doi = {10.1007/S11416-015-0238-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/ShinYKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/VenkateshCNB15, author = {Bharath Venkatesh and Sudip Hazra Choudhury and Shishir Nagaraja and N. Balakrishnan}, title = {BotSpot: fast graph based identification of structured {P2P} bots}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {11}, number = {4}, pages = {247--261}, year = {2015}, url = {https://doi.org/10.1007/s11416-015-0250-2}, doi = {10.1007/S11416-015-0250-2}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/VenkateshCNB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.