Journal of Computer Virology and Hacking Techniques最新文献

筛选
英文 中文
Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends 面向人工智能的下一代网络安全模式:俄罗斯市场挑战与未来全球技术趋势
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-07-23 DOI: 10.1007/s11416-024-00529-x
Ekaterina Pleshakova, Aleksey Osipov, Sergey Gataullin, Timur Gataullin, Athanasios Vasilakos
{"title":"Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends","authors":"Ekaterina Pleshakova, Aleksey Osipov, Sergey Gataullin, Timur Gataullin, Athanasios Vasilakos","doi":"10.1007/s11416-024-00529-x","DOIUrl":"https://doi.org/10.1007/s11416-024-00529-x","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141812709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differences with high probability and impossible differentials for the KB-256 cipher KB-256 密码的高概率差分和不可能差分
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-07-08 DOI: 10.1007/s11416-024-00532-2
R. Astrakhantsev, A. Chuhno, A. Dmukh, A. Kurochkin, I. Astrakhantseva
{"title":"Differences with high probability and impossible differentials for the KB-256 cipher","authors":"R. Astrakhantsev, A. Chuhno, A. Dmukh, A. Kurochkin, I. Astrakhantseva","doi":"10.1007/s11416-024-00532-2","DOIUrl":"https://doi.org/10.1007/s11416-024-00532-2","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141669323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Oblivion: an open-source system for large-scale analysis of macro-based office malware 遗忘:大规模分析基于宏的办公恶意软件的开源系统
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-07-02 DOI: 10.1007/s11416-024-00531-3
Alessandro Sanna, Fabrizio Cara, Davide Maiorca, Giorgio Giacinto
{"title":"Oblivion: an open-source system for large-scale analysis of macro-based office malware","authors":"Alessandro Sanna, Fabrizio Cara, Davide Maiorca, Giorgio Giacinto","doi":"10.1007/s11416-024-00531-3","DOIUrl":"https://doi.org/10.1007/s11416-024-00531-3","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On modular (CRT-based) secret sharing 关于模块化(基于 CRT 的)秘密共享
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-07-01 DOI: 10.1007/s11416-024-00530-4
N. Shenets
{"title":"On modular (CRT-based) secret sharing","authors":"N. Shenets","doi":"10.1007/s11416-024-00530-4","DOIUrl":"https://doi.org/10.1007/s11416-024-00530-4","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design criteria of a new code-based KEM 基于代码的新 KEM 的设计标准
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-06-13 DOI: 10.1007/s11416-024-00527-z
V. Vysotskaya, Ivan Chizhov
{"title":"Design criteria of a new code-based KEM","authors":"V. Vysotskaya, Ivan Chizhov","doi":"10.1007/s11416-024-00527-z","DOIUrl":"https://doi.org/10.1007/s11416-024-00527-z","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Antimalware applied to IoT malware detection based on softcore processor endowed with authorial sandbox 应用于物联网恶意软件检测的反恶意软件,基于配备作者沙箱的软核处理器
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-06-03 DOI: 10.1007/s11416-024-00526-0
Igor Pinheiro Henriques de Araújo, Liosvaldo Mariano Santiago de Abreu, Sthéfano Henrique Mendes Tavares Silva, Ricardo Paranhos Pinheiro, Sidney Marlon Lopes de Lima
{"title":"Antimalware applied to IoT malware detection based on softcore processor endowed with authorial sandbox","authors":"Igor Pinheiro Henriques de Araújo, Liosvaldo Mariano Santiago de Abreu, Sthéfano Henrique Mendes Tavares Silva, Ricardo Paranhos Pinheiro, Sidney Marlon Lopes de Lima","doi":"10.1007/s11416-024-00526-0","DOIUrl":"https://doi.org/10.1007/s11416-024-00526-0","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141268782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices 关于改进用于保护面向块的系统存储设备的一种块密码操作模式的安全界限
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-06-03 DOI: 10.1007/s11416-024-00528-y
Georgii Firsov, Alisa Koreneva
{"title":"On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices","authors":"Georgii Firsov, Alisa Koreneva","doi":"10.1007/s11416-024-00528-y","DOIUrl":"https://doi.org/10.1007/s11416-024-00528-y","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141272397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching linear structures of permutation groups with quantum computer 用量子计算机搜索置换群的线性结构
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-05-24 DOI: 10.1007/s11416-024-00523-3
Mikhail Polyakov, Pyotr Kluycharev
{"title":"Searching linear structures of permutation groups with quantum computer","authors":"Mikhail Polyakov, Pyotr Kluycharev","doi":"10.1007/s11416-024-00523-3","DOIUrl":"https://doi.org/10.1007/s11416-024-00523-3","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141099450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto-anarchy: a paradigm shift for society and the legal system 加密无政府状态:社会和法律制度的范式转变
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-05-23 DOI: 10.1007/s11416-024-00525-1
A. Zhuk
{"title":"Crypto-anarchy: a paradigm shift for society and the legal system","authors":"A. Zhuk","doi":"10.1007/s11416-024-00525-1","DOIUrl":"https://doi.org/10.1007/s11416-024-00525-1","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141105626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The distance-bounding protocol based on Russian cryptographic algorithms 基于俄罗斯密码算法的距离约束协议
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2024-05-17 DOI: 10.1007/s11416-024-00524-2
V. Belsky, Anastasiia Chichaeva, Vasily Shishkin, K. Tsaregorodtsev
{"title":"The distance-bounding protocol based on Russian cryptographic algorithms","authors":"V. Belsky, Anastasiia Chichaeva, Vasily Shishkin, K. Tsaregorodtsev","doi":"10.1007/s11416-024-00524-2","DOIUrl":"https://doi.org/10.1007/s11416-024-00524-2","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141126741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信