Journal: Journal in Computer Virology

Volume 12, Issue 3

121 -- 123Yu-Keum Jeong, Roy C. Park. Knowledge-based System and Security
125 -- 130MyounJae Lee. Secure game development for IoT environment
131 -- 136Olivier Ferrand, Eric Filiol. Combinatorial detection of malware by IAT discrimination
137 -- 143Sunghyuck Hong. Two-channel user authentication by using USB on Cloud
145 -- 150Yong Chan Kim, Jongkun Lee. A secure analysis of vehicular authentication security scheme of RSUs in VANET
151 -- 161Do Yeon Kim, GuoZhong Li, Seong-Taek Park, Mi-Hyun Ko. A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis
163 -- 167Bo-Seon Kang, Keun-Ho Lee. 2-Channel authentication technique using cardiac impulse based OTP
169 -- 175Kiyoung Kim, Byung-Joon Park, Yuhwa Suh, Jaepyo Park. OTT user authentication system by age classification
177 -- 184Joon Ho Kim, Myung-Chul Ma, Jae-Pyo Park. An analysis on secure coding using symbolic execution engine
185 -- 190Hyung-Jin Mun, Kun Hee Han. Blackhole attack: user identity and password seize attack using honeypot
191 -- 202Jonathan Dechaux, Eric Filiol. Proactive defense against malicious documents: formalization, implementation and case studies