Journal in Computer Virology最新文献

筛选
英文 中文
Malware as interaction machines: a new framework for behavior modelling 作为交互机器的恶意软件:行为建模的新框架
Journal in Computer Virology Pub Date : 2008-02-21 DOI: 10.1007/s11416-008-0085-1
G. Jacob, E. Filiol, Hervé Debar
{"title":"Malware as interaction machines: a new framework for behavior modelling","authors":"G. Jacob, E. Filiol, Hervé Debar","doi":"10.1007/s11416-008-0085-1","DOIUrl":"https://doi.org/10.1007/s11416-008-0085-1","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Code obfuscation techniques for metamorphic viruses 变态病毒的代码混淆技术
Journal in Computer Virology Pub Date : 2008-02-21 DOI: 10.1007/s11416-008-0084-2
J. Borello, L. Mé
{"title":"Code obfuscation techniques for metamorphic viruses","authors":"J. Borello, L. Mé","doi":"10.1007/s11416-008-0084-2","DOIUrl":"https://doi.org/10.1007/s11416-008-0084-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116221991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 181
An intelligent PE-malware detection system based on association mining 基于关联挖掘的pe恶意软件智能检测系统
Journal in Computer Virology Pub Date : 2008-02-05 DOI: 10.1007/s11416-008-0082-4
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, Q. Jiang
{"title":"An intelligent PE-malware detection system based on association mining","authors":"Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, Q. Jiang","doi":"10.1007/s11416-008-0082-4","DOIUrl":"https://doi.org/10.1007/s11416-008-0082-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114852256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 195
Static analysis by abstract interpretation: application to the detection of heap overflows 抽象解释的静态分析:用于检测堆溢出
Journal in Computer Virology Pub Date : 2008-02-01 DOI: 10.1007/s11416-007-0063-z
Xavier Allamigeon, Charles Hymans
{"title":"Static analysis by abstract interpretation: application to the detection of heap overflows","authors":"Xavier Allamigeon, Charles Hymans","doi":"10.1007/s11416-007-0063-z","DOIUrl":"https://doi.org/10.1007/s11416-007-0063-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Discovering and exploiting 802.11 wireless driver vulnerabilities 发现和利用802.11无线驱动程序漏洞
Journal in Computer Virology Pub Date : 2008-02-01 DOI: 10.1007/s11416-007-0065-x
L. Butti, J. Tinnés
{"title":"Discovering and exploiting 802.11 wireless driver vulnerabilities","authors":"L. Butti, J. Tinnés","doi":"10.1007/s11416-007-0065-x","DOIUrl":"https://doi.org/10.1007/s11416-007-0065-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Evolution of cross site request forgery attacks 跨站请求伪造攻击的演变
Journal in Computer Virology Pub Date : 2008-02-01 DOI: 10.1007/s11416-007-0068-7
Renaud Feil, L. Nyffenegger
{"title":"Evolution of cross site request forgery attacks","authors":"Renaud Feil, L. Nyffenegger","doi":"10.1007/s11416-007-0068-7","DOIUrl":"https://doi.org/10.1007/s11416-007-0068-7","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126378112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Advances in password cracking 密码破解研究进展
Journal in Computer Virology Pub Date : 2008-02-01 DOI: 10.1007/s11416-007-0064-y
Simon Marechal
{"title":"Advances in password cracking","authors":"Simon Marechal","doi":"10.1007/s11416-007-0064-y","DOIUrl":"https://doi.org/10.1007/s11416-007-0064-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131778490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Linux 2.6 kernel exploits Linux 2.6内核漏洞
Journal in Computer Virology Pub Date : 2008-02-01 DOI: 10.1007/s11416-007-0066-9
Stéphane Duverger
{"title":"Linux 2.6 kernel exploits","authors":"Stéphane Duverger","doi":"10.1007/s11416-007-0066-9","DOIUrl":"https://doi.org/10.1007/s11416-007-0066-9","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal affordance-based models of computer virus reproduction 计算机病毒复制的正式可视性模型
Journal in Computer Virology Pub Date : 2008-01-30 DOI: 10.1007/s11416-007-0079-4
M. Webster, G. Malcolm
{"title":"Formal affordance-based models of computer virus reproduction","authors":"M. Webster, G. Malcolm","doi":"10.1007/s11416-007-0079-4","DOIUrl":"https://doi.org/10.1007/s11416-007-0079-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving security and performance of an Ad Hoc network through a multipath routing strategy 通过多路径路由策略提高Ad Hoc网络的安全性和性能
Journal in Computer Virology Pub Date : 2008-01-25 DOI: 10.1007/s11416-007-0072-y
Hervé Aïache, F. Haettel, Laure Lebrun, C. Tavernier
{"title":"Improving security and performance of an Ad Hoc network through a multipath routing strategy","authors":"Hervé Aïache, F. Haettel, Laure Lebrun, C. Tavernier","doi":"10.1007/s11416-007-0072-y","DOIUrl":"https://doi.org/10.1007/s11416-007-0072-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信