Journal: Journal in Computer Virology

Volume 6, Issue 1

1 -- 29Sébastien Tricaud, Philippe Saadé. Applied parallel coordinates for logs and network traffic attack analysis
31 -- 42Ezzat Kirmani, Cynthia S. Hood. Analysis of a scanning model of worm propagation
43 -- 55Safaa O. Al-Mamory, Hongli Zhang. New data mining technique to enhance IDS alarms quality
57 -- 64Humberto J. Abdelnur, Radu State, Olivier Festor. Advanced fuzzing in the VoIP space
65 -- 75Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera. Simulating malware with MAlSim
77 -- 90Alexandre Gazet. Comparative analysis of various ransomware virii