Journal: Journal in Computer Virology

Volume 17, Issue 4

265 -- 278Alireza Shameli Sendi. Understanding Linux kernel vulnerabilities
279 -- 297Niccolò Marastoni, Roberto Giacobazzi, Mila Dalla Preda. Data augmentation and transfer learning to classify malware images in a deep learning context
299 -- 306Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, Kshitij Pradeep Gupta, Aarti Amod Agarkar. Signature-less ransomware detection and mitigation
307 -- 318Soodeh Hosseini, Ali Emamali Nezhad, Hossein Seilani. Android malware classification using convolutional neural network and LSTM
319 -- 331Hadis Ghanei, Farnoush Manavi, Ali Hamzeh. A novel method for malware detection based on hardware events using deep neural networks
333 -- 346Varshini Reddy, Naimisha Kolli, Balakrishnan Narayanaswamy. Malware detection and classification using community detection and social network analysis

Volume 17, Issue 3

165 -- 166Antonella Santone. Editorial
167 -- 183Marco Campion, Mila Dalla Preda, Roberto Giacobazzi. Learning metamorphic malware signatures from samples
185 -- 198Baptiste David, Maxence Delong, Eric Filiol. Detection of crawler traps: formalization and implementation - defeating protection on internet and on the TOR network
199 -- 220Joanna Moubarak, Eric Filiol, Maroun Chamoun. The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes
221 -- 227Francesco Mercaldo. A framework for supporting ransomware detection and prevention based on hybrid analysis
229 -- 248Mark Vella, Christian Colombo 0001, Robert Abela, Peter Spacek. RV-TEE: secure cryptographic protocol execution based on runtime verification
249 -- 263Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Francesco Racciatti. A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks

Volume 17, Issue 2

91 -- 104Mathilde Venault, Baptiste David. Superfetch: the famous unknown spy
105 -- 117François Plumerault, Baptiste David. DBI, debuggers, VM: gotta catch them all
119 -- 129Manar Aldaoud, Dawood Al-Abri, Ahmed Al-Maashri, Firdous Kausar. DHCP attacking tools: an analysis
131 -- 137Hejun Xu, Binkai Jiang. Study on a security intelligence trading platform based on blockchain and IPFS
139 -- 152Francesco Mercaldo, Antonella Santone. Audio signal processing for Android malware detection and family identification
153 -- 163Yunchun Zhang, Haorui Li, Yang Zheng, Shaowen Yao, Jiaqi Jiang. Enhanced DNNs for malware classification with GAN-based adversarial training

Volume 17, Issue 1

1 -- 20Daniel Ricardo Dos Santos, Mario Dagrada, Elisa Costante. Leveraging operational technology and the Internet of things to attack smart buildings
21 -- 36Mamta, Brij B. Gupta. An attribute-based keyword search for m-Health networks
37 -- 46Aleksandra V. Markelova. Embedding asymmetric backdoors into the RSA key generator
47 -- 59Krzysztof Wawryn, Patryk Widulinski. Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method
61 -- 74Zahian Ismail, Aman Jantan, Mohd Najwadi Yusoff, Muhammad Ubale Kiru. The effects of feature selection on the classification of encrypted botnet
75 -- 89Rizwan Ur Rahman, Deepak Singh Tomar. Threats of price scraping on e-commerce websites: attack model and its detection using neural network