Journal: Journal in Computer Virology

Volume 10, Issue 4

219 -- 227Mathieu Cunche. I know your MAC address: targeted tracking of individual using Wi-Fi
229 -- 238Jagdish Prasad Achara, James-Douglass Lefruit, Vincent Roca, Claude Castelluccia. Detecting privacy leaks in the RATP App: how we proceeded and what we found
239 -- 253Guillaume Bouffard, Jean-Louis Lanet. Reversing the operating system of a Java based smart card
255 -- 271Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero. Black-box forensic and antiforensic characteristics of solid-state drives
273 -- 297Nikki Benecke Brandt, Mark Stamp. Automating NFC message sending for good and evil

Volume 10, Issue 3

165 -- 176Ciprian Oprisa, George Cabau, Adrian Colesa. Automatic code features extraction using bio-inspired algorithms
177 -- 187Teja Tamboli, Thomas H. Austin, Mark Stamp. Metamorphic code generation from LLVM bytecode
189 -- 203Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin. Detection of shellcodes in drive-by attacks using kernel machines
205 -- 210Eric Mahe, Jean-Marie Chauvet. Secrets from the GPU - True random bit generation and faster Diffie-Hellman for systemic cryptography
211 -- 217Josselin Feist, Laurent Mounier, Marie-Laure Potet. Statically detecting use after free on binary code

Volume 10, Issue 2

67 -- 70Sang Yeob Oh, Supratip Ghose, Hye-Jung Jang, Kyungyong Chung. Recent trends in Mobile Communication Systems
71 -- 80Il-Kyoung Kwon, Sang-Yong Lee. Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies
81 -- 88Sung-Ho Sim, Su-Jin Baek. A study on scalable information matching system based on web service information
89 -- 96So Hyeon Kim, Hyun Park, Hyo-Chan Bang, Do-Hyeun Kim. An indoor location tracking based on mobile RFID for smart exhibition service
97 -- 100Taehan Kim, Hyunmin Park, Bokeun Kim. Heuristic estimation of network capacity and spectrum requirement
101 -- 108Man Ki Kim, You-Sik Hong. Implementation of a web-based smart electronic needle system
109 -- 114Dae-Eun Lim, Tae Sung Kim. Modeling discovery and removal of security vulnerabilities in software system using priority queueing models
115 -- 118Young-Jin Choi, Gyu Jang Lee, Jong-Hei Ra, Whiejong M. Han. Adjusting context-aware RFID in health screening center
119 -- 128Dong-Hwan Kim, Kyung-hye Park, Gye-woon Choi, Kyung-jin Min. A study on the factors that affect the adoption of Smart Water Grid
129 -- 136Hyochang Ahn, Yong-Hwan Lee, June-Hwan Lee, Han-Jin Cho. A low complexity image stitching using advanced feature matching in mobile environments
137 -- 143Sam Jin Jeong. A loop splitting method for single loops with non-uniform dependences
145 -- 156Myoung-Kyu Choi, Kyeong-Seok Han. A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments
157 -- 163Sang-Gyun Kim, Jong-Sun Park. Legal limits of search and seizure for digital forensic in Korea

Volume 10, Issue 1

1 -- 10Osamah L. Barakat, Shaiful J. Hashim, Raja Syamsul Azmir Raja Abdullah, Abdul Rahman Ramli, Fazirulhisyam Hashim, Khairulmizam Samsudin, Mahmud Ab Rahman. Malware analysis performance enhancement using cloud computing
11 -- 27Gerardo Canfora, Antonio Niccolò Iannaccone, Corrado Aaron Visaggio. Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics
29 -- 51Julian L. Rrushi, Ali A. Ghorbani. A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management
53 -- 65Sayali Deshpande, Young Hee Park, Mark Stamp. Eigenvalue analysis for metamorphic detection