Journal: Journal in Computer Virology

Volume 16, Issue 4

257 -- 258Eric Filiol. Editorial
259 -- 260Vladimir M. Fomichev, Alisa M. Koreneva. Editorial
261 -- 264Ekaterina Griboedova, Vasily Shishkin. Not so long, but very rich: a history of Russian crypto standardization
265 -- 268Mikhail Cherepniov. Comparison of the complexity of Diffie-Hellman and discrete logarithm problems
269 -- 274Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov. On post-handshake authentication and external PSKs in TLS 1.3
275 -- 284Nikolay Shenets. Multi-party pairwise key agreement in linear number of Diffie-Hellman key exchanges
285 -- 294Evgeny K. Alekseev, Kirill S. Goncharenko, Grigory B. Marshalko. Provably secure counter mode with related-key-based internal re-keying
295 -- 303Alexey Urivskiy, Mikhail A. Borodin, Andrey Rybkin. Finding distinguishers for pseudorandom number generators based on permutations
305 -- 312Alexey Yu. Nesterenko, Aleksandr M. Semenov. On the practical implementation of Russian protocols for low-resource cryptographic modules
313 -- 331Valery Vasenin, Alexander Itkes, Maxim A. Krivchikov, Evgeniya Yavtushenko. ChRelBAC data access control model for large-scale interactive informational-analytical systems
333 -- 341Mikhail A. Kudinov, Alexey A. Chilikov, Evgeniy O. Kiktenko, Aleksey K. Fedorov. Advanced attribute-based encryption protocol based on the modified secret sharing scheme

Volume 16, Issue 3

185 -- 196Marcus Botacin, Marco Antonio Zanata Alves, André Grégio. The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support
197 -- 216Vladimir Fomichev, Alisa Koreneva. Encryption performance and security of certain wide block ciphers
217 -- 227Jiaxing Cheng, Ying Li, Cheng Huang, Ailing Yu, Tao Zhang. ACER: detecting Shadowsocks server based on active probe technology
229 -- 244Mugdha Jain, William Andreopoulos, Mark Stamp. Convolutional neural networks and extreme learning machines for malware classification
245 -- 256Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Roldán Gómez, José Luis Martínez. An instrumentation based algorithm for stack overflow detection

Volume 16, Issue 2

103 -- 124Samiya Hamadouche, Jean-Louis Lanet, Mohamed Mezghiche. Hiding a fault enabled virus through code construction
125 -- 139Ali Aghamohammadi, Fathiyeh Faghih. Lightweight versus obfuscation-resilient malware detection in android applications
141 -- 155Marcus Botacin, Paulo Lício de Geus, André Grégio. Leveraging branch traces to understand kernel internals from within
157 -- 171Francesco Mercaldo, Antonella Santone. Deep learning for image-based mobile malware detection
173 -- 183François Plumerault, Baptiste David. Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws

Volume 16, Issue 1

1 -- 2Antonella Santone. Editorial
3 -- 18Eric Filiol, Maxence Delong, Nicolas J.. Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network
19 -- 61Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, Helge Janicke. PenQuest: a gamified attacker/defender meta model for cyber security assessment and education
63 -- 77Cinzia Bernardeschi, Andrea Domenici, Maurizio Palmieri. Formalization and co-simulation of attacks on cyber-physical systems
79 -- 92Samanvitha Basole, Fabio Di Troia, Mark Stamp. Multifamily malware models
93 -- 101Paul Tavolato, Hubert Schölnast, Christina Tavolato-Wötzl. Analytical modelling of cyber-physical systems: applying kinetic gas theory to anomaly detection in networks