- Grigory B. Marshalko, Svetlana Koreshkova. Protection against adversarial attacks with randomization of recognition algorithm. Journal in Computer Virology, 20(1):127-133, 2024.
- Akram Khalesi, Zahra Ahmadian. Provably minimum data complexity integral distinguisher based on conventional division property. Journal in Computer Virology, 20(1):113-125, 2024.
- Hashida Haidros Rahima Manzil, S. Manohar Naik. Android ransomware detection using a novel hamming distance based feature selection. Journal in Computer Virology, 20(1):71-93, 2024.
- Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia. Use of cryptography in malware obfuscation. Journal in Computer Virology, 20(1):135-152, 2024.
- Rohit Dube. Faulty use of the CIC-IDS 2017 dataset in information security research. Journal in Computer Virology, 20(1):203-211, 2024.
- Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna. Partial key exposure attack on RSA using some private key blocks. Journal in Computer Virology, 20(1):185-193, 2024.
- Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili. Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights. Journal in Computer Virology, 20(1):95-111, 2024.
- Vrinda Malhotra, Katerina Potika, Mark Stamp 0001. A comparison of graph neural networks for malware classification. Journal in Computer Virology, 20(1):53-69, 2024.
- Mila Dalla Preda, Michele Ianni. Exploiting number theory for dynamic software watermarking. Journal in Computer Virology, 20(1):41-51, 2024.
- Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan. Networking and cryptography library with a non-repudiation flavor for blockchain. Journal in Computer Virology, 20(1):1-14, 2024.