Journal in Computer Virology最新文献

筛选
英文 中文
Dronezilla: designing an accurate malware behavior retrieval system Dronezilla:设计精确的恶意软件行为检索系统
Journal in Computer Virology Pub Date : 2012-07-04 DOI: 10.1007/s11416-012-0170-3
Mihai Cimpoesu, C. Popa
{"title":"Dronezilla: designing an accurate malware behavior retrieval system","authors":"Mihai Cimpoesu, C. Popa","doi":"10.1007/s11416-012-0170-3","DOIUrl":"https://doi.org/10.1007/s11416-012-0170-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116718375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECFGM: enriched control flow graph miner for unknown vicious infected code detection ECFGM:用于未知恶意感染代码检测的丰富控制流图挖掘器
Journal in Computer Virology Pub Date : 2012-06-19 DOI: 10.1007/s11416-012-0169-9
Mojtaba Eskandari, S. Hashemi
{"title":"ECFGM: enriched control flow graph miner for unknown vicious infected code detection","authors":"Mojtaba Eskandari, S. Hashemi","doi":"10.1007/s11416-012-0169-9","DOIUrl":"https://doi.org/10.1007/s11416-012-0169-9","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114577843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Anti-virtual machines and emulations 反虚拟机和仿真
Journal in Computer Virology Pub Date : 2012-06-19 DOI: 10.1007/s11416-012-0165-0
Anoirel Issa
{"title":"Anti-virtual machines and emulations","authors":"Anoirel Issa","doi":"10.1007/s11416-012-0165-0","DOIUrl":"https://doi.org/10.1007/s11416-012-0165-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123332957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A practical approach on clustering malicious PDF documents 恶意PDF文档聚类的实用方法
Journal in Computer Virology Pub Date : 2012-06-15 DOI: 10.1007/s11416-012-0166-z
Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea
{"title":"A practical approach on clustering malicious PDF documents","authors":"Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea","doi":"10.1007/s11416-012-0166-z","DOIUrl":"https://doi.org/10.1007/s11416-012-0166-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
On covert channels between virtual machines 在虚拟机之间的隐蔽通道上
Journal in Computer Virology Pub Date : 2012-06-15 DOI: 10.1007/s11416-012-0168-x
P. Ranjith, C. Priya, Kaleeswaran Shalini
{"title":"On covert channels between virtual machines","authors":"P. Ranjith, C. Priya, Kaleeswaran Shalini","doi":"10.1007/s11416-012-0168-x","DOIUrl":"https://doi.org/10.1007/s11416-012-0168-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
In situ reuse of logically extracted functional components 逻辑提取的功能组件的原位重用
Journal in Computer Virology Pub Date : 2012-06-14 DOI: 10.1007/s11416-012-0167-y
Craig Miles, Arun Lakhotia, Andrew Walenstein
{"title":"In situ reuse of logically extracted functional components","authors":"Craig Miles, Arun Lakhotia, Andrew Walenstein","doi":"10.1007/s11416-012-0167-y","DOIUrl":"https://doi.org/10.1007/s11416-012-0167-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The proactivity of Perceptron derived algorithms in malware detection 感知器衍生算法在恶意软件检测中的主动性
Journal in Computer Virology Pub Date : 2012-05-17 DOI: 10.1007/s11416-012-0164-1
Mihai Cimpoesu, Dragos Gavrilut, Adrian-Stefan Popescu
{"title":"The proactivity of Perceptron derived algorithms in malware detection","authors":"Mihai Cimpoesu, Dragos Gavrilut, Adrian-Stefan Popescu","doi":"10.1007/s11416-012-0164-1","DOIUrl":"https://doi.org/10.1007/s11416-012-0164-1","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115444104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Symbian worm Yxes: towards mobile botnets? 塞班蠕虫Yxes:走向移动僵尸网络?
Journal in Computer Virology Pub Date : 2012-05-01 DOI: 10.1007/s11416-012-0163-2
A. Apvrille
{"title":"Symbian worm Yxes: towards mobile botnets?","authors":"A. Apvrille","doi":"10.1007/s11416-012-0163-2","DOIUrl":"https://doi.org/10.1007/s11416-012-0163-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125529492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Opcode graph similarity and metamorphic detection 操作码图相似和变质检测
Journal in Computer Virology Pub Date : 2012-05-01 DOI: 10.1007/s11416-012-0160-5
Neha Runwal, R. Low, M. Stamp
{"title":"Opcode graph similarity and metamorphic detection","authors":"Neha Runwal, R. Low, M. Stamp","doi":"10.1007/s11416-012-0160-5","DOIUrl":"https://doi.org/10.1007/s11416-012-0160-5","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"79 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130696959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 156
What’s in a name. . . generator? 名字里有什么……发电机吗?
Journal in Computer Virology Pub Date : 2012-04-26 DOI: 10.1007/s11416-012-0161-4
John Aycock
{"title":"What’s in a name. . . generator?","authors":"John Aycock","doi":"10.1007/s11416-012-0161-4","DOIUrl":"https://doi.org/10.1007/s11416-012-0161-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129896338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信