Journal: Journal in Computer Virology

Volume 13, Issue 4

239 -- 240Sunkyung Rhyu, Sang Yeob Oh. Hacking and convergence computing
241 -- 247Sunghyuck Hong. Secure and light IoT protocol (SLIP) for anti-hacking
249 -- 255GuoZhong Li, Jian Sheng Dai, Eun-Mi Park, Seong-Taek Park. A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news
257 -- 263Sang-Won Bang, Byeong-Soo Jung, Sang-Cheol Lee. Research on financial institutional network partition design for anti-hacking
265 -- 270Hak-Suh Kim, Sang Ho Lee. An evaluation method for secure virtual network embedding algorithms
271 -- 278Yoon-Su Jeong. Secure information authentication protocol between patients and medical staff in a hospital environment
279 -- 288Hyun Yoo, Joo-Chang Kim, Keon-Woo Kim, Roy C. Park. Context aware based user customized light therapy service using security framework
289 -- 296Sung Kyu Park, Song-Ha Lee, Taek-Young Kim, Hyo-Jung Jun, Tae Sung Kim. A performance evaluation of information security training in public sector
297 -- 303Sun-Moon Jo. Secure access policy for efficient resource in mobile computing environment
305 -- 311Sang Un Ahn, Sang Oh Park, Jeong-Heon Kim, Byungyun Kong. Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment

Volume 13, Issue 3

141 -- 152Sukanya Thakur, Mark Stamp. A completely covert audio channel in Android
153 -- 166Hashem Hashemi, Amin Azmoodeh, Ali Hamzeh, Sattar Hashemi. Graph embedding as a new approach for unknown malware detection
167 -- 178Jiang Ming, Dongpeng Xu, Dinghao Wu. MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization
179 -- 192Ricardo J. Rodríguez. Evolution and characterization of point-of-sale RAM scraping malware
193 -- 207Jiang Ming, Zhi-Xin, Pengwei Lan, Dinghao Wu, Peng Liu 0005, Bing Mao. Impeding behavior-based malware analysis via replacement attacks to malware specifications
209 -- 232Mila Dalla Preda, Federico Maggi. Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology
233 -- 238Kyung-Hwan Cha, Dae-Ki Kang. Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection

Volume 13, Issue 2

87 -- 93Baptiste David, Eric Filiol, Kévin Gallienne. Structural analysis of binary executable headers for malware detection optimization
95 -- 107Swathi Pai, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp. Clustering for malware classification
109 -- 123Mozhdeh Farhadi, Jean-Louis Lanet. Chronicle of a Java Card death
125 -- 138Varsha M. V., P. Vinod, K. A. Dhanya. Identification of malicious android app using manifest and opcode features
139 -- 0Ricardo J. Rodríguez. Erratum to: Evolution and characterization of point-of-sale RAM scraping malware

Volume 13, Issue 1

1 -- 12Anusha Damodaran, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp. A comparison of static, dynamic, and hybrid analysis for malware detection
13 -- 27Julian L. Rrushi. Plaintext side channels in TLS Chiphertex
29 -- 46Stavros D. Nikolopoulos, Iosif Polenakis. A graph-based model for malware detection and classification using system-call groups
47 -- 85Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser. Semantics-aware detection of targeted attacks: a survey