Search dblp for Publications

export results for "toc:db/journals/virology/virology11.bht:"

 download as .bib file

@article{DBLP:journals/virology/AfonsoAGJG15,
  author       = {Vitor Monte Afonso and
                  Matheus Favero de Amorim and
                  Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and
                  Glauco Barroso Junquera and
                  Paulo L{\'{\i}}cio de Geus},
  title        = {Identifying Android malware using dynamically obtained features},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {1},
  pages        = {9--17},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0226-7},
  doi          = {10.1007/S11416-014-0226-7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AfonsoAGJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AlamSTH15,
  author       = {Shahid Alam and
                  Ibrahim Sogukpinar and
                  Issa Traor{\'{e}} and
                  R. Nigel Horspool},
  title        = {Sliding window and control flow weight for metamorphic malware detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {2},
  pages        = {75--88},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0222-y},
  doi          = {10.1007/S11416-014-0222-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/AlamSTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AnnachhatreAS15,
  author       = {Chinmayee Annachhatre and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Hidden Markov models for malware classification},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {2},
  pages        = {59--73},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0215-x},
  doi          = {10.1007/S11416-014-0215-X},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/AnnachhatreAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ApvrilleA15,
  author       = {Axelle Apvrille and
                  Ludovic Apvrille},
  title        = {SherlockDroid: a research assistant to spot unknown malware in Android
                  marketplaces},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {4},
  pages        = {235--245},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-015-0245-z},
  doi          = {10.1007/S11416-015-0245-Z},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ApvrilleA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Choi15,
  author       = {Sung Choi},
  title        = {Study on model fostering for cloud service brokerage},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {181--192},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-015-0246-y},
  doi          = {10.1007/S11416-015-0246-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Choi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Ferrand15,
  author       = {Olivier Ferrand},
  title        = {How to detect the Cuckoo Sandbox and to Strengthen it?},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {1},
  pages        = {51--58},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0224-9},
  doi          = {10.1007/S11416-014-0224-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Ferrand15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/GooL15,
  author       = {Eun{-}Hee Goo and
                  Seung{-}Dae Lee},
  title        = {Reconfigurable real number field elliptic curve cryptography to improve
                  the security},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {123--128},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0233-8},
  doi          = {10.1007/S11416-014-0233-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/GooL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Hamon15,
  author       = {Valentin Hamon},
  title        = {Android botnets for multi-targeted attacks},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {4},
  pages        = {193--202},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0216-9},
  doi          = {10.1007/S11416-014-0216-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Hamon15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Hong15,
  author       = {Sunghyuck Hong},
  title        = {Efficient and secure {DNS} cyber shelter on DDoS attacks},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {129--136},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0230-y},
  doi          = {10.1007/S11416-014-0230-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Hong15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JeongK15,
  author       = {Yoon{-}Su Jeong and
                  Yong{-}Tae Kim},
  title        = {A token-based authentication security scheme for Hadoop distributed
                  file system using elliptic curve cryptography},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {137--142},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0236-5},
  doi          = {10.1007/S11416-014-0236-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/JeongK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JidigamAS15,
  author       = {Ranjith Kumar Jidigam and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Singular value decomposition and metamorphic detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {4},
  pages        = {203--216},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0220-0},
  doi          = {10.1007/S11416-014-0220-0},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/JidigamAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/JoC15,
  author       = {Sun{-}Moon Jo and
                  Kyungyong Chung},
  title        = {An efficient thread partition policy for secure functional language},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {165--171},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0234-7},
  doi          = {10.1007/S11416-014-0234-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/JoC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KalbhorAFJS15,
  author       = {Ashwin Kalbhor and
                  Thomas H. Austin and
                  Eric Filiol and
                  S{\'{e}}bastien Josse and
                  Mark Stamp},
  title        = {Dueling hidden Markov models for virus analysis},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {2},
  pages        = {103--118},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0232-9},
  doi          = {10.1007/S11416-014-0232-9},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/KalbhorAFJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Kang15,
  author       = {Lachlan Kang},
  title        = {Efficient botnet herding within the Tor network},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {1},
  pages        = {19--26},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0229-4},
  doi          = {10.1007/S11416-014-0229-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Kang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KheirHW15,
  author       = {Nizar Kheir and
                  Xiao Han and
                  Chirine Wolley},
  title        = {Behavioral fine-grained detection and classification of {P2P} bots},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {4},
  pages        = {217--233},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0228-5},
  doi          = {10.1007/S11416-014-0228-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KheirHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KimL15,
  author       = {Jung{-}Hoon Kim and
                  Keun{-}Ho Lee},
  title        = {Vulnerabilities of intelligent automobiles using {TPEG} update based
                  on {T-DMB} and its countermeasures},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {143--148},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-015-0243-1},
  doi          = {10.1007/S11416-015-0243-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KimL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/KumarC15,
  author       = {Diksha Gautam Kumar and
                  Madhumita Chatterjee},
  title        = {{MAC} based solution for {SQL} injection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {1},
  pages        = {1--7},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0219-6},
  doi          = {10.1007/S11416-014-0219-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/KumarC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Lee15,
  author       = {Aeri Lee},
  title        = {Authentication scheme for smart learning system in the cloud computing
                  environment},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {149--155},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-015-0240-4},
  doi          = {10.1007/S11416-015-0240-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/Lee15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LeeI15,
  author       = {Sang Chul Lee and
                  Kwang Hyuk Im},
  title        = {Banking behavior in security and multi-channel environment},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {157--164},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0235-6},
  doi          = {10.1007/S11416-014-0235-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LeeI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/MusaleAS15,
  author       = {Mangesh Musale and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Hunting for metamorphic JavaScript malware},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {2},
  pages        = {89--102},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0225-8},
  doi          = {10.1007/S11416-014-0225-8},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/MusaleAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/OhGJRH15,
  author       = {Sang{-}Yeob Oh and
                  Supratip Ghose and
                  Yu{-}Keum Jeong and
                  Joong{-}Kyung Ryu and
                  Jung{-}Soo Han},
  title        = {Convergence security systems},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {119--121},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-015-0248-9},
  doi          = {10.1007/S11416-015-0248-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/OhGJRH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ShahM15,
  author       = {Sugandh Shah and
                  Babu M. Mehtre},
  title        = {An overview of vulnerability assessment and penetration testing techniques},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {1},
  pages        = {27--49},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-014-0231-x},
  doi          = {10.1007/S11416-014-0231-X},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ShahM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ShinYKL15,
  author       = {Sumi Shin and
                  Suhyeon Yoo and
                  Hyesun Kim and
                  Taeseok Lee},
  title        = {Association analysis of technology convergence based on information
                  system utilization},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {3},
  pages        = {173--179},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-015-0238-y},
  doi          = {10.1007/S11416-015-0238-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ShinYKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/VenkateshCNB15,
  author       = {Bharath Venkatesh and
                  Sudip Hazra Choudhury and
                  Shishir Nagaraja and
                  N. Balakrishnan},
  title        = {BotSpot: fast graph based identification of structured {P2P} bots},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {11},
  number       = {4},
  pages        = {247--261},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11416-015-0250-2},
  doi          = {10.1007/S11416-015-0250-2},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/VenkateshCNB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}