- Mina Ebrahim, Seyyed Alireza Hashemi Golpayegani. Anomaly detection in business processes logs using social network analysis. Journal in Computer Virology, 18(2):127-139, 2022.
- Andrey Dmukh, Dmitry Trifonov, A. Chookhno. Modification of the key schedule of the 2-GOST block cipher and its implementation on FPGA. Journal in Computer Virology, 18(1):49-59, 2022.
- Abhishek Mallik, Anavi Khetarpal, Sanjay Kumar. ConRec: malware classification using convolutional recurrence. Journal in Computer Virology, 18(4):297-313, 2022.
- Stavros D. Nikolopoulos, Iosif Polenakis. Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs. Journal in Computer Virology, 18(4):383-406, 2022.
- Denis Denisenko. Quantum differential cryptanalysis. Journal in Computer Virology, 18(1):3-10, 2022.
- Farnoush Manavi, Ali Hamzeh. A novel approach for ransomware detection based on PE header using graph embedding. Journal in Computer Virology, 18(4):285-296, 2022.
- Zhihong Zhou, Hu Bin, Jianhua Li 0001, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao. Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning. Journal in Computer Virology, 18(4):453-463, 2022.
- Urvashi Rahul Saxena, Taj Alam. Role based access control using identity and broadcast based encryption for securing cloud data. Journal in Computer Virology, 18(3):171-182, 2022.
- Ron Stajnrod, Raz Ben Yehuda, Nezer Jacob Zaidenberg. Attacking TrustZone on devices lacking memory protection. Journal in Computer Virology, 18(3):259-269, 2022.
- Mohammed Ali Elsiddig, Mohammed Mejri. Detection of suspicious internet traffic based on differential analysis and logical rules. Journal in Computer Virology, 18(4):347-365, 2022.