181 | -- | 195 | Boris Lau, Vanja Svajcer. Measuring virtual machine detection in malware using DSD tracer |
207 | -- | 237 | Jean-Baptiste Bedrune, Eric Filiol, Frédéric Raynal. Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis |
239 | -- | 259 | Asaf Shabtai, Yuval Fledel, Yuval Elovici, Yuval Shahar. Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics |
261 | -- | 276 | Yoann Guillot, Alexandre Gazet. Automatic binary deobfuscation |
277 | -- | 287 | Jean-Marie Borello, Eric Filiol, Ludovic Mé. From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques |