Ekaterina Pleshakova, Aleksey Osipov, Sergey Gataullin, Timur Gataullin, Athanasios Vasilakos
{"title":"Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends","authors":"Ekaterina Pleshakova, Aleksey Osipov, Sergey Gataullin, Timur Gataullin, Athanasios Vasilakos","doi":"10.1007/s11416-024-00529-x","DOIUrl":"https://doi.org/10.1007/s11416-024-00529-x","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141812709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Astrakhantsev, A. Chuhno, A. Dmukh, A. Kurochkin, I. Astrakhantseva
{"title":"Differences with high probability and impossible differentials for the KB-256 cipher","authors":"R. Astrakhantsev, A. Chuhno, A. Dmukh, A. Kurochkin, I. Astrakhantseva","doi":"10.1007/s11416-024-00532-2","DOIUrl":"https://doi.org/10.1007/s11416-024-00532-2","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141669323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alessandro Sanna, Fabrizio Cara, Davide Maiorca, Giorgio Giacinto
{"title":"Oblivion: an open-source system for large-scale analysis of macro-based office malware","authors":"Alessandro Sanna, Fabrizio Cara, Davide Maiorca, Giorgio Giacinto","doi":"10.1007/s11416-024-00531-3","DOIUrl":"https://doi.org/10.1007/s11416-024-00531-3","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design criteria of a new code-based KEM","authors":"V. Vysotskaya, Ivan Chizhov","doi":"10.1007/s11416-024-00527-z","DOIUrl":"https://doi.org/10.1007/s11416-024-00527-z","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Igor Pinheiro Henriques de Araújo, Liosvaldo Mariano Santiago de Abreu, Sthéfano Henrique Mendes Tavares Silva, Ricardo Paranhos Pinheiro, Sidney Marlon Lopes de Lima
{"title":"Antimalware applied to IoT malware detection based on softcore processor endowed with authorial sandbox","authors":"Igor Pinheiro Henriques de Araújo, Liosvaldo Mariano Santiago de Abreu, Sthéfano Henrique Mendes Tavares Silva, Ricardo Paranhos Pinheiro, Sidney Marlon Lopes de Lima","doi":"10.1007/s11416-024-00526-0","DOIUrl":"https://doi.org/10.1007/s11416-024-00526-0","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141268782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices","authors":"Georgii Firsov, Alisa Koreneva","doi":"10.1007/s11416-024-00528-y","DOIUrl":"https://doi.org/10.1007/s11416-024-00528-y","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141272397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Searching linear structures of permutation groups with quantum computer","authors":"Mikhail Polyakov, Pyotr Kluycharev","doi":"10.1007/s11416-024-00523-3","DOIUrl":"https://doi.org/10.1007/s11416-024-00523-3","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141099450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crypto-anarchy: a paradigm shift for society and the legal system","authors":"A. Zhuk","doi":"10.1007/s11416-024-00525-1","DOIUrl":"https://doi.org/10.1007/s11416-024-00525-1","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141105626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Belsky, Anastasiia Chichaeva, Vasily Shishkin, K. Tsaregorodtsev
{"title":"The distance-bounding protocol based on Russian cryptographic algorithms","authors":"V. Belsky, Anastasiia Chichaeva, Vasily Shishkin, K. Tsaregorodtsev","doi":"10.1007/s11416-024-00524-2","DOIUrl":"https://doi.org/10.1007/s11416-024-00524-2","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141126741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}