165 | -- | 166 | Antonella Santone. Editorial |
167 | -- | 183 | Marco Campion, Mila Dalla Preda, Roberto Giacobazzi. Learning metamorphic malware signatures from samples |
185 | -- | 198 | Baptiste David, Maxence Delong, Eric Filiol. Detection of crawler traps: formalization and implementation - defeating protection on internet and on the TOR network |
199 | -- | 220 | Joanna Moubarak, Eric Filiol, Maroun Chamoun. The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes |
221 | -- | 227 | Francesco Mercaldo. A framework for supporting ransomware detection and prevention based on hybrid analysis |
229 | -- | 248 | Mark Vella, Christian Colombo 0001, Robert Abela, Peter Spacek. RV-TEE: secure cryptographic protocol execution based on runtime verification |
249 | -- | 263 | Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Francesco Racciatti. A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks |