Journal in Computer Virology最新文献

筛选
英文 中文
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging SBMDS:一个基于可解释字符串的恶意软件检测系统,使用支持向量机与装袋集成
Journal in Computer Virology Pub Date : 2009-11-01 DOI: 10.1007/s11416-008-0108-y
Yanfang Ye, Lifei Chen, Dingding Wang, Tao Li, Q. Jiang, Min Zhao
{"title":"SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging","authors":"Yanfang Ye, Lifei Chen, Dingding Wang, Tao Li, Q. Jiang, Min Zhao","doi":"10.1007/s11416-008-0108-y","DOIUrl":"https://doi.org/10.1007/s11416-008-0108-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129130117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
Danger theory and collaborative filtering in MANETs manet中的危险理论与协同过滤
Journal in Computer Virology Pub Date : 2009-11-01 DOI: 10.1007/s11416-008-0098-9
Katherine Hoffman, Attila Ondi, R. Ford, M. Carvalho, Derek Brown, W. Allen, G. Marin
{"title":"Danger theory and collaborative filtering in MANETs","authors":"Katherine Hoffman, Attila Ondi, R. Ford, M. Carvalho, Derek Brown, W. Allen, G. Marin","doi":"10.1007/s11416-008-0098-9","DOIUrl":"https://doi.org/10.1007/s11416-008-0098-9","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130102036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Functional polymorphic engines: formalisation, implementation and use cases 功能多态引擎:形式化、实现和用例
Journal in Computer Virology Pub Date : 2009-08-01 DOI: 10.1007/s11416-008-0095-z
G. Jacob, E. Filiol, Hervé Debar
{"title":"Functional polymorphic engines: formalisation, implementation and use cases","authors":"G. Jacob, E. Filiol, Hervé Debar","doi":"10.1007/s11416-008-0095-z","DOIUrl":"https://doi.org/10.1007/s11416-008-0095-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134005630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Fragmented malware through RFID and its defenses 碎片恶意软件通过射频识别及其防御
Journal in Computer Virology Pub Date : 2009-08-01 DOI: 10.1007/s11416-008-0106-0
M. K. Shankarapani, A. Sulaiman, Srinivas Mukkamala
{"title":"Fragmented malware through RFID and its defenses","authors":"M. K. Shankarapani, A. Sulaiman, Srinivas Mukkamala","doi":"10.1007/s11416-008-0106-0","DOIUrl":"https://doi.org/10.1007/s11416-008-0106-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128518734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection of metamorphic and virtualization-based malware using algebraic specification 基于代数规范的变形和虚拟化恶意软件检测
Journal in Computer Virology Pub Date : 2009-08-01 DOI: 10.1007/s11416-008-0094-0
M. Webster, G. Malcolm
{"title":"Detection of metamorphic and virtualization-based malware using algebraic specification","authors":"M. Webster, G. Malcolm","doi":"10.1007/s11416-008-0094-0","DOIUrl":"https://doi.org/10.1007/s11416-008-0094-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Extended recursion-based formalization of virus mutation 基于扩展递归的病毒变异形式化
Journal in Computer Virology Pub Date : 2009-08-01 DOI: 10.1007/s11416-008-0090-4
Philippe Beaucamps
{"title":"Extended recursion-based formalization of virus mutation","authors":"Philippe Beaucamps","doi":"10.1007/s11416-008-0090-4","DOIUrl":"https://doi.org/10.1007/s11416-008-0090-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116468421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Specification and evaluation of polymorphic shellcode properties using a new temporal logic 使用新的时态逻辑规范和评估多态shellcode属性
Journal in Computer Virology Pub Date : 2009-08-01 DOI: 10.1007/s11416-008-0089-x
Mehdi Talbi, M. Mejri, A. Bouhoula
{"title":"Specification and evaluation of polymorphic shellcode properties using a new temporal logic","authors":"Mehdi Talbi, M. Mejri, A. Bouhoula","doi":"10.1007/s11416-008-0089-x","DOIUrl":"https://doi.org/10.1007/s11416-008-0089-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117002457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Architecture of a morphological malware detector 形态恶意软件检测器的体系结构
Journal in Computer Virology Pub Date : 2009-08-01 DOI: 10.1007/s11416-008-0102-4
Guillaume Bonfante, M. Kaczmarek, J. Marion
{"title":"Architecture of a morphological malware detector","authors":"Guillaume Bonfante, M. Kaczmarek, J. Marion","doi":"10.1007/s11416-008-0102-4","DOIUrl":"https://doi.org/10.1007/s11416-008-0102-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134262195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Unknown malcode detection and the imbalance problem 未知恶意码检测和失衡问题
Journal in Computer Virology Pub Date : 2009-07-11 DOI: 10.1007/s11416-009-0122-8
Robert Moskovitch, Dima Stopel, Clint Feher, N. Nissim, N. Japkowicz, Y. Elovici
{"title":"Unknown malcode detection and the imbalance problem","authors":"Robert Moskovitch, Dima Stopel, Clint Feher, N. Nissim, N. Japkowicz, Y. Elovici","doi":"10.1007/s11416-009-0122-8","DOIUrl":"https://doi.org/10.1007/s11416-009-0122-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
On the trade-off between speed and resiliency of Flash worms and similar malcodes 关于Flash蠕虫和类似恶意代码的速度和弹性之间的权衡
Journal in Computer Virology Pub Date : 2009-06-24 DOI: 10.1007/s11416-009-0124-6
Duc T. Ha, H. Ngo
{"title":"On the trade-off between speed and resiliency of Flash worms and similar malcodes","authors":"Duc T. Ha, H. Ngo","doi":"10.1007/s11416-009-0124-6","DOIUrl":"https://doi.org/10.1007/s11416-009-0124-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131617136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信