1 | -- | 2 | Vlasti Broucek, Eric Filiol, Paul Turner. Foreword |
3 | -- | 12 | Vlasti Broucek, Paul Turner. Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research |
13 | -- | 20 | Sarah Gordon, Richard Ford. On the definition and classification of cybercrime |
21 | -- | 34 | Gerald Tripp. A Parallel String Matching Engine for use in High Speed Network Intrusion Detection Systems |
35 | -- | 50 | Eric Filiol. Malware Pattern Scanning Schemes Secure Against Black-box Analysis |
51 | -- | 65 | Sébastien Josse. How to Assess the Effectiveness of your Anti-virus? |
67 | -- | 77 | Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda. Dynamic Analysis of Malicious Code |
79 | -- | 85 | John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.. Anti-disassembly using Cryptographic Hash Functions |
87 | -- | 97 | Baris Kayayurt, Tugkan Tuglular. End-to-end security implementation for mobile devices using TLS protocol |