Journal in Computer Virology最新文献

筛选
英文 中文
Simulating malware with MAlSim 用MAlSim模拟恶意软件
Journal in Computer Virology Pub Date : 2010-02-01 DOI: 10.1007/s11416-008-0088-y
R. Leszczyna, I. N. Fovino, M. Masera
{"title":"Simulating malware with MAlSim","authors":"R. Leszczyna, I. N. Fovino, M. Masera","doi":"10.1007/s11416-008-0088-y","DOIUrl":"https://doi.org/10.1007/s11416-008-0088-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132648522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Applied parallel coordinates for logs and network traffic attack analysis 应用并行坐标进行日志和网络流量攻击分析
Journal in Computer Virology Pub Date : 2010-02-01 DOI: 10.1007/s11416-009-0127-3
S. Tricaud, Philippe Saadé
{"title":"Applied parallel coordinates for logs and network traffic attack analysis","authors":"S. Tricaud, Philippe Saadé","doi":"10.1007/s11416-009-0127-3","DOIUrl":"https://doi.org/10.1007/s11416-009-0127-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Analysis of a scanning model of worm propagation 蠕虫传播的扫描模型分析
Journal in Computer Virology Pub Date : 2010-02-01 DOI: 10.1007/s11416-008-0111-3
Ezzat Kirmani, C. Hood
{"title":"Analysis of a scanning model of worm propagation","authors":"Ezzat Kirmani, C. Hood","doi":"10.1007/s11416-008-0111-3","DOIUrl":"https://doi.org/10.1007/s11416-008-0111-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123101349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Advanced fuzzing in the VoIP space VoIP领域的高级模糊测试
Journal in Computer Virology Pub Date : 2010-02-01 DOI: 10.1007/s11416-009-0123-7
H. Abdelnur, R. State, O. Festor
{"title":"Advanced fuzzing in the VoIP space","authors":"H. Abdelnur, R. State, O. Festor","doi":"10.1007/s11416-009-0123-7","DOIUrl":"https://doi.org/10.1007/s11416-009-0123-7","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparative analysis of various ransomware virii 各种勒索病毒的比较分析
Journal in Computer Virology Pub Date : 2010-02-01 DOI: 10.1007/s11416-008-0092-2
Alexandre Gazet
{"title":"Comparative analysis of various ransomware virii","authors":"Alexandre Gazet","doi":"10.1007/s11416-008-0092-2","DOIUrl":"https://doi.org/10.1007/s11416-008-0092-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133697468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 165
Filter-resistant code injection on ARM ARM上的抗过滤代码注入
Journal in Computer Virology Pub Date : 2009-11-09 DOI: 10.1007/s11416-010-0146-0
Yves Younan, Pieter Philippaerts, F. Piessens, W. Joosen, Sven Lachmund, T. Walter
{"title":"Filter-resistant code injection on ARM","authors":"Yves Younan, Pieter Philippaerts, F. Piessens, W. Joosen, Sven Lachmund, T. Walter","doi":"10.1007/s11416-010-0146-0","DOIUrl":"https://doi.org/10.1007/s11416-010-0146-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116169288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Evaluation of malware phylogeny modelling systems using automated variant generation 使用自动变体生成的恶意软件系统发育建模系统的评估
Journal in Computer Virology Pub Date : 2009-11-01 DOI: 10.1007/s11416-008-0100-6
Matthew Hayes, Andrew Walenstein, Arun Lakhotia
{"title":"Evaluation of malware phylogeny modelling systems using automated variant generation","authors":"Matthew Hayes, Andrew Walenstein, Arun Lakhotia","doi":"10.1007/s11416-008-0100-6","DOIUrl":"https://doi.org/10.1007/s11416-008-0100-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Treating scalability and modelling human countermeasures against local preference worms via gradient models 通过梯度模型处理可扩展性和模拟人类对局部偏好蠕虫的对策
Journal in Computer Virology Pub Date : 2009-11-01 DOI: 10.1007/s11416-008-0099-8
M. Avlonitis, E. Magkos, Michalis Stefanidakis, V. Chrissikopoulos
{"title":"Treating scalability and modelling human countermeasures against local preference worms via gradient models","authors":"M. Avlonitis, E. Magkos, Michalis Stefanidakis, V. Chrissikopoulos","doi":"10.1007/s11416-008-0099-8","DOIUrl":"https://doi.org/10.1007/s11416-008-0099-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IDS alerts correlation using grammar-based approach IDS使用基于语法的方法提醒相关性
Journal in Computer Virology Pub Date : 2009-11-01 DOI: 10.1007/s11416-008-0103-3
S. Al-Mamory, Hongli Zhang
{"title":"IDS alerts correlation using grammar-based approach","authors":"S. Al-Mamory, Hongli Zhang","doi":"10.1007/s11416-008-0103-3","DOIUrl":"https://doi.org/10.1007/s11416-008-0103-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
White-box attack context cryptovirology 白盒攻击上下文密码病毒学
Journal in Computer Virology Pub Date : 2009-11-01 DOI: 10.1007/s11416-008-0097-x
Sébastien Josse
{"title":"White-box attack context cryptovirology","authors":"Sébastien Josse","doi":"10.1007/s11416-008-0097-x","DOIUrl":"https://doi.org/10.1007/s11416-008-0097-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123501284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信