Journal in Computer Virology最新文献

筛选
英文 中文
Profile hidden Markov models and metamorphic virus detection 配置文件隐藏马尔可夫模型和变形病毒检测
Journal in Computer Virology Pub Date : 2009-05-01 DOI: 10.1007/s11416-008-0105-1
Srilatha Attaluri, Scott McGhee, M. Stamp
{"title":"Profile hidden Markov models and metamorphic virus detection","authors":"Srilatha Attaluri, Scott McGhee, M. Stamp","doi":"10.1007/s11416-008-0105-1","DOIUrl":"https://doi.org/10.1007/s11416-008-0105-1","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122200312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
Code mutation techniques by means of formal grammars and automatons 采用形式语法和自动机的代码变异技术
Journal in Computer Virology Pub Date : 2009-04-15 DOI: 10.1007/s11416-009-0121-9
P. V. Zbitskiy
{"title":"Code mutation techniques by means of formal grammars and automatons","authors":"P. V. Zbitskiy","doi":"10.1007/s11416-009-0121-9","DOIUrl":"https://doi.org/10.1007/s11416-009-0121-9","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122233665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Fast virus detection by using high speed time delay neural networks 基于高速时滞神经网络的快速病毒检测
Journal in Computer Virology Pub Date : 2009-03-23 DOI: 10.1007/s11416-009-0120-x
H. El-Bakry
{"title":"Fast virus detection by using high speed time delay neural networks","authors":"H. El-Bakry","doi":"10.1007/s11416-009-0120-x","DOIUrl":"https://doi.org/10.1007/s11416-009-0120-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Semi-automatic binary protection tampering 半自动二进制保护篡改
Journal in Computer Virology Pub Date : 2009-02-24 DOI: 10.1007/s11416-009-0118-4
Yoann Guillot, Alexandre Gazet
{"title":"Semi-automatic binary protection tampering","authors":"Yoann Guillot, Alexandre Gazet","doi":"10.1007/s11416-009-0118-4","DOIUrl":"https://doi.org/10.1007/s11416-009-0118-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122113195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Editors/translators Foreword 编辑/译者前言
Journal in Computer Virology Pub Date : 2009-02-20 DOI: 10.1007/s11416-008-0116-y
D. Bilar, E. Filiol
{"title":"Editors/translators Foreword","authors":"D. Bilar, E. Filiol","doi":"10.1007/s11416-008-0116-y","DOIUrl":"https://doi.org/10.1007/s11416-008-0116-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125049148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On self-reproducing computer programs 关于自我复制的计算机程序
Journal in Computer Virology Pub Date : 2009-02-20 DOI: 10.1007/s11416-008-0115-z
D. Bilar, E. Filiol
{"title":"On self-reproducing computer programs","authors":"D. Bilar, E. Filiol","doi":"10.1007/s11416-008-0115-z","DOIUrl":"https://doi.org/10.1007/s11416-008-0115-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121237823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Auto-Sign: an automatic signature generator for high-speed malware filtering devices 自动签名:用于高速恶意软件过滤设备的自动签名生成器
Journal in Computer Virology Pub Date : 2009-02-07 DOI: 10.1007/s11416-009-0119-3
Gil Tahan, Chanan Glezer, Y. Elovici, L. Rokach
{"title":"Auto-Sign: an automatic signature generator for high-speed malware filtering devices","authors":"Gil Tahan, Chanan Glezer, Y. Elovici, L. Rokach","doi":"10.1007/s11416-009-0119-3","DOIUrl":"https://doi.org/10.1007/s11416-009-0119-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127054581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A little journey inside Windows memory Windows内存中的一个小旅程
Journal in Computer Virology Pub Date : 2009-01-10 DOI: 10.1007/s11416-008-0112-2
Damien Aumaitre
{"title":"A little journey inside Windows memory","authors":"Damien Aumaitre","doi":"10.1007/s11416-008-0112-2","DOIUrl":"https://doi.org/10.1007/s11416-008-0112-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SQL infections through RFID 通过RFID感染SQL
Journal in Computer Virology Pub Date : 2008-11-01 DOI: 10.1007/s11416-007-0075-8
A. Sulaiman, Srinivas Mukkamala, A. Sung
{"title":"SQL infections through RFID","authors":"A. Sulaiman, Srinivas Mukkamala, A. Sung","doi":"10.1007/s11416-007-0075-8","DOIUrl":"https://doi.org/10.1007/s11416-007-0075-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121084732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Malware behaviour analysis 恶意软件行为分析
Journal in Computer Virology Pub Date : 2008-11-01 DOI: 10.1007/s11416-007-0074-9
G. Wagener, R. State, A. Dulaunoy
{"title":"Malware behaviour analysis","authors":"G. Wagener, R. State, A. Dulaunoy","doi":"10.1007/s11416-007-0074-9","DOIUrl":"https://doi.org/10.1007/s11416-007-0074-9","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132538935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信