Journal in Computer Virology最新文献

筛选
英文 中文
Reducing the window of opportunity for Android malware Gotta catch ’em all 减少Android恶意软件的机会之窗
Journal in Computer Virology Pub Date : 2012-04-26 DOI: 10.1007/s11416-012-0162-3
A. Apvrille, Tim Strazzere
{"title":"Reducing the window of opportunity for Android malware Gotta catch ’em all","authors":"A. Apvrille, Tim Strazzere","doi":"10.1007/s11416-012-0162-3","DOIUrl":"https://doi.org/10.1007/s11416-012-0162-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart card, the stealth leaker 智能卡,秘密泄密者
Journal in Computer Virology Pub Date : 2012-02-29 DOI: 10.1007/s11416-012-0159-y
V. Guyot
{"title":"Smart card, the stealth leaker","authors":"V. Guyot","doi":"10.1007/s11416-012-0159-y","DOIUrl":"https://doi.org/10.1007/s11416-012-0159-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ARDrone corruption ARDrone腐败
Journal in Computer Virology Pub Date : 2011-12-29 DOI: 10.1007/s11416-011-0158-4
Eddy Deligne
{"title":"ARDrone corruption","authors":"Eddy Deligne","doi":"10.1007/s11416-011-0158-4","DOIUrl":"https://doi.org/10.1007/s11416-011-0158-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Shadow attacks: automatically evading system-call-behavior based malware detection 影子攻击:自动逃避基于系统调用行为的恶意软件检测
Journal in Computer Virology Pub Date : 2011-12-20 DOI: 10.1007/s11416-011-0157-5
Weiqin Ma, Pu Duan, Sanmin Liu, G. Gu, Jyh-Charn S. Liu
{"title":"Shadow attacks: automatically evading system-call-behavior based malware detection","authors":"Weiqin Ma, Pu Duan, Sanmin Liu, G. Gu, Jyh-Charn S. Liu","doi":"10.1007/s11416-011-0157-5","DOIUrl":"https://doi.org/10.1007/s11416-011-0157-5","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Comparing files using structural entropy 使用结构熵比较文件
Journal in Computer Virology Pub Date : 2011-11-01 DOI: 10.1007/s11416-011-0153-9
Ivan Sorokin
{"title":"Comparing files using structural entropy","authors":"Ivan Sorokin","doi":"10.1007/s11416-011-0153-9","DOIUrl":"https://doi.org/10.1007/s11416-011-0153-9","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Run-time malware detection based on positive selection 基于正选择的运行时恶意软件检测
Journal in Computer Virology Pub Date : 2011-11-01 DOI: 10.1007/s11416-011-0154-8
Fuyong Zhang, Qi Deyu
{"title":"Run-time malware detection based on positive selection","authors":"Fuyong Zhang, Qi Deyu","doi":"10.1007/s11416-011-0154-8","DOIUrl":"https://doi.org/10.1007/s11416-011-0154-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Graph-based malware detection using dynamic analysis 基于图形的恶意软件检测使用动态分析
Journal in Computer Virology Pub Date : 2011-11-01 DOI: 10.1007/s11416-011-0152-x
Blake Anderson, Daniel Quist, Joshua Neil, C. Storlie, T. Lane
{"title":"Graph-based malware detection using dynamic analysis","authors":"Blake Anderson, Daniel Quist, Joshua Neil, C. Storlie, T. Lane","doi":"10.1007/s11416-011-0152-x","DOIUrl":"https://doi.org/10.1007/s11416-011-0152-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121964561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 270
Classification of packet contents for malware detection 对报文内容进行分类,用于检测恶意软件
Journal in Computer Virology Pub Date : 2011-11-01 DOI: 10.1007/s11416-011-0156-6
Irfan Ahmed, K. Lhee
{"title":"Classification of packet contents for malware detection","authors":"Irfan Ahmed, K. Lhee","doi":"10.1007/s11416-011-0156-6","DOIUrl":"https://doi.org/10.1007/s11416-011-0156-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1962 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129600349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Hunting for undetectable metamorphic viruses 寻找无法检测的变形病毒
Journal in Computer Virology Pub Date : 2011-08-01 DOI: 10.1007/s11416-010-0148-y
Da Lin, M. Stamp
{"title":"Hunting for undetectable metamorphic viruses","authors":"Da Lin, M. Stamp","doi":"10.1007/s11416-010-0148-y","DOIUrl":"https://doi.org/10.1007/s11416-010-0148-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 137
Heliza: talking dirty to the attackers 对袭击者说脏话
Journal in Computer Virology Pub Date : 2011-08-01 DOI: 10.1007/s11416-010-0150-4
G. Wagener, R. State, A. Dulaunoy, T. Engel
{"title":"Heliza: talking dirty to the attackers","authors":"G. Wagener, R. State, A. Dulaunoy, T. Engel","doi":"10.1007/s11416-010-0150-4","DOIUrl":"https://doi.org/10.1007/s11416-010-0150-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信