Journal in Computer Virology最新文献

筛选
英文 中文
Malware and steganography in hard disk firmware 硬盘固件中的恶意软件和隐写
Journal in Computer Virology Pub Date : 2011-08-01 DOI: 10.1007/s11416-010-0149-x
I. Sutherland, Gareth Davies, A. Blyth
{"title":"Malware and steganography in hard disk firmware","authors":"I. Sutherland, Gareth Davies, A. Blyth","doi":"10.1007/s11416-010-0149-x","DOIUrl":"https://doi.org/10.1007/s11416-010-0149-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123029690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Managing university internet access: balancing the need for security, privacy and digital evidence 管理大学互联网接入:平衡对安全、隐私和数字证据的需求
Journal in Computer Virology Pub Date : 2011-08-01 DOI: 10.1007/s11416-010-0147-z
Vlasti Broucek, P. Turner, M. Zimmerli
{"title":"Managing university internet access: balancing the need for security, privacy and digital evidence","authors":"Vlasti Broucek, P. Turner, M. Zimmerli","doi":"10.1007/s11416-010-0147-z","DOIUrl":"https://doi.org/10.1007/s11416-010-0147-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134444491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determining malicious executable distinguishing attributes and low-complexity detection 确定恶意可执行文件的区分属性和低复杂度检测
Journal in Computer Virology Pub Date : 2011-05-01 DOI: 10.1007/s11416-010-0140-6
Hassan Khan, Fauzan Mirza, S. A. Khayam
{"title":"Determining malicious executable distinguishing attributes and low-complexity detection","authors":"Hassan Khan, Fauzan Mirza, S. A. Khayam","doi":"10.1007/s11416-010-0140-6","DOIUrl":"https://doi.org/10.1007/s11416-010-0140-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132775363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned 建立和部署高交互蜜罐:实验和经验教训
Journal in Computer Virology Pub Date : 2011-05-01 DOI: 10.1007/s11416-010-0144-2
V. Nicomette, M. Kaâniche, E. Alata, M. Herrb
{"title":"Set-up and deployment of a high-interaction honeypot: experiment and lessons learned","authors":"V. Nicomette, M. Kaâniche, E. Alata, M. Herrb","doi":"10.1007/s11416-010-0144-2","DOIUrl":"https://doi.org/10.1007/s11416-010-0144-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132481683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
An N-Gram and STF-IDF model for masquerade detection in a UNIX environment UNIX环境中用于伪装检测的N-Gram和STF-IDF模型
Journal in Computer Virology Pub Date : 2011-05-01 DOI: 10.1007/s11416-010-0143-3
Dai Geng, Tomohiro Odaka, J. Kuroiwa, H. Ogura
{"title":"An N-Gram and STF-IDF model for masquerade detection in a UNIX environment","authors":"Dai Geng, Tomohiro Odaka, J. Kuroiwa, H. Ogura","doi":"10.1007/s11416-010-0143-3","DOIUrl":"https://doi.org/10.1007/s11416-010-0143-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Joint network-host based malware detection using information-theoretic tools 基于信息理论工具的联合网络主机恶意软件检测
Journal in Computer Virology Pub Date : 2011-05-01 DOI: 10.1007/s11416-010-0145-1
S. A. Khayam, Ayesha Binte Ashfaq, H. Radha
{"title":"Joint network-host based malware detection using information-theoretic tools","authors":"S. A. Khayam, Ayesha Binte Ashfaq, H. Radha","doi":"10.1007/s11416-010-0145-1","DOIUrl":"https://doi.org/10.1007/s11416-010-0145-1","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131544683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Malware detection using assembly and API call sequences 恶意软件检测使用汇编和API调用序列
Journal in Computer Virology Pub Date : 2011-05-01 DOI: 10.1007/s11416-010-0141-5
M. K. Shankarapani, S. Ramamoorthy, Ram S. Movva, Srinivas Mukkamala
{"title":"Malware detection using assembly and API call sequences","authors":"M. K. Shankarapani, S. Ramamoorthy, Ram S. Movva, Srinivas Mukkamala","doi":"10.1007/s11416-010-0141-5","DOIUrl":"https://doi.org/10.1007/s11416-010-0141-5","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130372824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
Improving antivirus accuracy with hypervisor assisted analysis 通过管理程序辅助分析提高防病毒准确性
Journal in Computer Virology Pub Date : 2011-05-01 DOI: 10.1007/s11416-010-0142-4
Daniel Quist, L. Liebrock, Joshua Neil
{"title":"Improving antivirus accuracy with hypervisor assisted analysis","authors":"Daniel Quist, L. Liebrock, Joshua Neil","doi":"10.1007/s11416-010-0142-4","DOIUrl":"https://doi.org/10.1007/s11416-010-0142-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117056327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Removing web spam links from search engine results 从搜索引擎结果中删除网络垃圾链接
Journal in Computer Virology Pub Date : 2011-02-01 DOI: 10.1007/s11416-009-0132-6
Manuel Egele, C. Kolbitsch, Christian Platzer
{"title":"Removing web spam links from search engine results","authors":"Manuel Egele, C. Kolbitsch, Christian Platzer","doi":"10.1007/s11416-009-0132-6","DOIUrl":"https://doi.org/10.1007/s11416-009-0132-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124723691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Accuracy improving guidelines for network anomaly detection systems 网络异常检测系统精度提高指南
Journal in Computer Virology Pub Date : 2011-02-01 DOI: 10.1007/s11416-009-0133-5
Ayesha Binte Ashfaq, M. Ali, S. A. Khayam
{"title":"Accuracy improving guidelines for network anomaly detection systems","authors":"Ayesha Binte Ashfaq, M. Ali, S. A. Khayam","doi":"10.1007/s11416-009-0133-5","DOIUrl":"https://doi.org/10.1007/s11416-009-0133-5","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书