{"title":"Malware as interaction machines: a new framework for behavior modelling","authors":"G. Jacob, E. Filiol, Hervé Debar","doi":"10.1007/s11416-008-0085-1","DOIUrl":"https://doi.org/10.1007/s11416-008-0085-1","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code obfuscation techniques for metamorphic viruses","authors":"J. Borello, L. Mé","doi":"10.1007/s11416-008-0084-2","DOIUrl":"https://doi.org/10.1007/s11416-008-0084-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116221991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, Q. Jiang
{"title":"An intelligent PE-malware detection system based on association mining","authors":"Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, Q. Jiang","doi":"10.1007/s11416-008-0082-4","DOIUrl":"https://doi.org/10.1007/s11416-008-0082-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114852256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static analysis by abstract interpretation: application to the detection of heap overflows","authors":"Xavier Allamigeon, Charles Hymans","doi":"10.1007/s11416-007-0063-z","DOIUrl":"https://doi.org/10.1007/s11416-007-0063-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering and exploiting 802.11 wireless driver vulnerabilities","authors":"L. Butti, J. Tinnés","doi":"10.1007/s11416-007-0065-x","DOIUrl":"https://doi.org/10.1007/s11416-007-0065-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of cross site request forgery attacks","authors":"Renaud Feil, L. Nyffenegger","doi":"10.1007/s11416-007-0068-7","DOIUrl":"https://doi.org/10.1007/s11416-007-0068-7","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126378112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in password cracking","authors":"Simon Marechal","doi":"10.1007/s11416-007-0064-y","DOIUrl":"https://doi.org/10.1007/s11416-007-0064-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131778490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal affordance-based models of computer virus reproduction","authors":"M. Webster, G. Malcolm","doi":"10.1007/s11416-007-0079-4","DOIUrl":"https://doi.org/10.1007/s11416-007-0079-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hervé Aïache, F. Haettel, Laure Lebrun, C. Tavernier
{"title":"Improving security and performance of an Ad Hoc network through a multipath routing strategy","authors":"Hervé Aïache, F. Haettel, Laure Lebrun, C. Tavernier","doi":"10.1007/s11416-007-0072-y","DOIUrl":"https://doi.org/10.1007/s11416-007-0072-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}