default search action
Journal in Computer Virology, Volume 3
Volume 3, Number 1, April 2007
- Guillaume Bonfante, Jean-Yves Marion:
Foreword. 1-2 - Philippe Beaucamps, Eric Filiol:
On the possibility of practically obfuscating programs towards a unified perspective of code protection. 3-21 - Eric Filiol, Grégoire Jacob, Mickaël Le Liard:
Evaluation methodology and theoretical model for antiviral behavioural detection strategies. 23-37 - Benjamin Morin, Ludovic Mé:
Intrusion detection and virology: an analysis of differences, similarities and complementariness. 39-49 - Radu State, Olivier Festor:
Malware: a future framework for device, network and service management. 51-60
Volume 3, Number 2, June 2007
- Rainer Fahs, Vlasti Broucek:
Letter from the EICAR Chairman. 61 - Vlasti Broucek, Paul Turner:
Foreword. 63-64 - Eric Filiol, Sébastien Josse:
A statistical model for undecidable viral detection. 65-74 - Eric Filiol:
Formalisation and implementation aspects of K -ary (malicious) codes. 75-86 - Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
A spatial stochastic model for worm propagation: scale effects. 87-92 - Attila Ondi, Richard Ford:
How good is good enough? Metrics for worm/anti-worm evaluation. 93-101 - Vinoo Thomas, Nitin Jyoti:
Bot countermeasures. 103-111 - Sébastien Josse:
Rootkit detection from outside the Matrix. 113-123 - Gerald Tripp:
Regular expression matching with input compression: a hardware design for use within network intrusion detection systems. 125-134 - Jörg Preuß, Steven Furnell, Maria Papadaki:
Considering the potential of criminal profiling to combat hacking. 135-141 - Lizzie Coles-Kemp, Richard E. Overill:
On the role of the Facilitator in information security risk assessment. 143-148 - Urs E. Gattiker:
Bologna process revisited: educating information security and malware experts. 149-161 - Linfeng Li, Marko Helenius:
Usability evaluation of anti-phishing toolbars. 163-184 - Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
Transaction pseudonyms in mobile environments. 185-194
Volume 3, Number 3, August 2007
- Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:
Enabling automated threat response through the use of a dynamic security policy. 195-210 - Chandra Prakash:
B-tree with fixed node size and no minimum degree. 211-219 - Sébastien Josse:
Secure and advanced unpacking using computer emulation. 221-236 - Alok Sharma, Kuldip K. Paliwal:
Detecting masquerades using a combination of Naïve Bayes and weighted RBF approach. 237-245
Volume 3, Number 4, November 2007
- Anne Bonfante, Jean-Yves Marion:
On the defence notion. 247-251 - Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith:
Software transformations to improve malware detection. 253-265 - Salima Hacini, Zahia Guessoum, Zizette Boufaïda:
TAMAP: a new trust-based approach for mobile agent protection. 267-283 - Daniel Bilar:
On callgraphs and generative mechanisms. 285-297 - Daniel Bilar:
On callgraphs and generative mechanisms. 299-310
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.