default search action
Journal in Computer Virology, Volume 4
Volume 4, Number 1, February 2008
- Philippe Biondi, Eric Filiol:
Foreword. 1-3 - Xavier Allamigeon, Charles Hymans:
Static analysis by abstract interpretation: application to the detection of heap overflows. 5-23 - Laurent Butti, Julien Tinnés:
Discovering and exploiting 802.11 wireless driver vulnerabilities. 25-37 - Stéphane Duverger:
Linux 2.6 kernel exploits. 39-60 - Renaud Feil, Louis Nyffenegger:
Evolution of cross site request forgery attacks. 61-71 - Simon Marechal:
Advances in password cracking. 73-81
Volume 4, Number 2, May 2008
- Nicolas Ruff:
Windows memory forensics. 83-100 - Guillaume Duc, Ronan Keryell:
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. 101-113 - Philippe Lagadec:
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007). 115-125 - Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche:
Internet attacks monitoring with dynamic connection redirection mechanisms. 127-136 - Éric Lacombe, Frédéric Raynal, Vincent Nicomette:
Rootkit modeling and experiments under Linux. 137-157
Volume 4, Number 3, August 2008
- Eric Filiol:
Editorial. 159-160 - Martin Johns:
On JavaScript Malware and related threats. 161-178 - Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan:
Enhancing web browser security against malware extensions. 179-195 - Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson:
On the adaptive real-time detection of fast-propagating network worms. 197-210 - Jean-Marie Borello, Ludovic Mé:
Code obfuscation techniques for metamorphic viruses. 211-220 - Jose Andre Morales, Peter J. Clarke, Yi Deng, B. M. Golam Kibria:
Characterization of virus replication. 221-234 - Grégoire Jacob, Eric Filiol, Hervé Debar:
Malware as interaction machines: a new framework for behavior modelling. 235-250 - Grégoire Jacob, Hervé Debar, Eric Filiol:
Behavioral detection of malware: from a survey towards an established taxonomy. 251-266
Volume 4, Number 4, November 2008
- Hervé Aïache, François Haettel, Laure Lebrun, Cédric Tavernier:
Improving security and performance of an Ad Hoc network through a multipath routing strategy. 267-278 - Gérard Wagener, Radu State, Alexandre Dulaunoy:
Malware behaviour analysis. 279-287 - Matt Webster, Grant Malcolm:
Formal affordance-based models of computer virus reproduction. 289-306 - Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia:
Constructing malware normalizers using term rewriting. 307-322 - Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye, Qingshan Jiang:
An intelligent PE-malware detection system based on association mining. 323-334 - Stanley J. Barr, Samuel J. Cardman, David M. Martin:
A boosting ensemble for the recognition of code sharing in malware. 335-345 - Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung:
SQL infections through RFID. 347-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.