Journal in Computer Virology最新文献

筛选
英文 中文
CPU bugs, CPU backdoors and consequences on security CPU bug, CPU后门和对安全性的影响
Journal in Computer Virology Pub Date : 2008-10-06 DOI: 10.1007/s11416-008-0109-x
L. Duflot
{"title":"CPU bugs, CPU backdoors and consequences on security","authors":"L. Duflot","doi":"10.1007/s11416-008-0109-x","DOIUrl":"https://doi.org/10.1007/s11416-008-0109-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Characterization of virus replication 病毒复制的表征
Journal in Computer Virology Pub Date : 2008-08-01 DOI: 10.1007/s11416-007-0077-6
J. Morales, Peter J. Clarke, Yi Deng, B. M. Kibria
{"title":"Characterization of virus replication","authors":"J. Morales, Peter J. Clarke, Yi Deng, B. M. Kibria","doi":"10.1007/s11416-007-0077-6","DOIUrl":"https://doi.org/10.1007/s11416-007-0077-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On JavaScript Malware and related threats 关于JavaScript恶意软件和相关威胁
Journal in Computer Virology Pub Date : 2008-08-01 DOI: 10.1007/s11416-007-0076-7
Martin Johns
{"title":"On JavaScript Malware and related threats","authors":"Martin Johns","doi":"10.1007/s11416-007-0076-7","DOIUrl":"https://doi.org/10.1007/s11416-007-0076-7","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116625472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Windows memory forensics Windows内存取证
Journal in Computer Virology Pub Date : 2008-05-01 DOI: 10.1007/s11416-007-0070-0
Nicolas Ruff
{"title":"Windows memory forensics","authors":"Nicolas Ruff","doi":"10.1007/s11416-007-0070-0","DOIUrl":"https://doi.org/10.1007/s11416-007-0070-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007) OpenDocument和Open XML安全(OpenOffice.org和MS Office 2007)
Journal in Computer Virology Pub Date : 2008-05-01 DOI: 10.1007/s11416-007-0060-2
P. Lagadec
{"title":"OpenDocument and Open XML security (OpenOffice.org and MS Office 2007)","authors":"P. Lagadec","doi":"10.1007/s11416-007-0060-2","DOIUrl":"https://doi.org/10.1007/s11416-007-0060-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123333432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection 通过具有内存加密、完整性和信息泄漏保护的高效安全架构提高病毒防护能力
Journal in Computer Virology Pub Date : 2008-05-01 DOI: 10.1007/s11416-007-0062-0
Guillaume Duc, R. Keryell
{"title":"Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection","authors":"Guillaume Duc, R. Keryell","doi":"10.1007/s11416-007-0062-0","DOIUrl":"https://doi.org/10.1007/s11416-007-0062-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128304086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet attacks monitoring with dynamic connection redirection mechanisms 使用动态连接重定向机制监控Internet攻击
Journal in Computer Virology Pub Date : 2008-05-01 DOI: 10.1007/s11416-007-0067-8
E. Alata, Ion Alberdi, V. Nicomette, P. Owezarski, M. Kaâniche
{"title":"Internet attacks monitoring with dynamic connection redirection mechanisms","authors":"E. Alata, Ion Alberdi, V. Nicomette, P. Owezarski, M. Kaâniche","doi":"10.1007/s11416-007-0067-8","DOIUrl":"https://doi.org/10.1007/s11416-007-0067-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Rootkit modeling and experiments under Linux Linux下的Rootkit建模和实验
Journal in Computer Virology Pub Date : 2008-05-01 DOI: 10.1007/s11416-007-0069-6
Éric Lacombe, F. Raynal, V. Nicomette
{"title":"Rootkit modeling and experiments under Linux","authors":"Éric Lacombe, F. Raynal, V. Nicomette","doi":"10.1007/s11416-007-0069-6","DOIUrl":"https://doi.org/10.1007/s11416-007-0069-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129375306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A boosting ensemble for the recognition of code sharing in malware 恶意软件代码共享识别的增强集成
Journal in Computer Virology Pub Date : 2008-04-22 DOI: 10.1007/s11416-008-0087-z
S. J. Barr, Samuel J. Cardman, David M. Martin
{"title":"A boosting ensemble for the recognition of code sharing in malware","authors":"S. J. Barr, Samuel J. Cardman, David M. Martin","doi":"10.1007/s11416-008-0087-z","DOIUrl":"https://doi.org/10.1007/s11416-008-0087-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Behavioral detection of malware: from a survey towards an established taxonomy 恶意软件的行为检测:从调查到建立分类法
Journal in Computer Virology Pub Date : 2008-02-21 DOI: 10.1007/s11416-008-0086-0
G. Jacob, Hervé Debar, E. Filiol
{"title":"Behavioral detection of malware: from a survey towards an established taxonomy","authors":"G. Jacob, Hervé Debar, E. Filiol","doi":"10.1007/s11416-008-0086-0","DOIUrl":"https://doi.org/10.1007/s11416-008-0086-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115810256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 227
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信