Journal: Journal in Computer Virology

Volume 7, Issue 1

1 -- 21Éric Lacombe, Vincent Nicomette, Yves Deswarte. Enforcing kernel constraints by hardware-assisted virtualization
23 -- 49Anthony Desnos, Eric Filiol, Ivan Lefou. Detecting (and creating !) a HVM rootkit (aka BluePill-like)
51 -- 62Manuel Egele, Clemens Kolbitsch, Christian Platzer. Removing web spam links from search engine results
63 -- 81Ayesha Binte Ashfaq, Muhammad Qasim Ali, Syed Ali Khayam. Accuracy improving guidelines for network anomaly detection systems
83 -- 93Julien Desfossez, Justine Dieppedale, Gabriel Girard. Stealth malware analysis from kernel space with Kolumbo