researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Journal in Computer Virology
Home
Index
Info
Issue
Volume
8
, Issue
1-2
1
--
13
Weiqin Ma
,
Pu Duan
,
Sanmin Liu
,
Guofei Gu
,
Jyh-Charn Liu
.
Shadow attacks: automatically evading system-call-behavior based malware detection
15
--
27
Eddy Deligne
.
ARDrone corruption
29
--
36
Vincent Guyot
.
Smart card, the stealth leaker
37
--
52
Neha Runwal
,
Richard M. Low
,
Mark Stamp
.
Opcode graph similarity and metamorphic detection
53
--
60
John Aycock
.
What's in a name. . . generator?
61
--
71
Axelle Apvrille
,
Tim Strazzere
.
Reducing the window of opportunity for Android malware Gotta catch 'em all