Journal: Journal in Computer Virology

Volume 2, Issue 4

241 -- 242Eric Filiol, Roland Büschkes, Pavel Laskov. Foreword
243 -- 256Konrad Rieck, Pavel Laskov. Language models for detection of unknown attacks in network traffic
257 -- 274Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. Network-level polymorphic shellcode detection using emulation
275 -- 289André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer. Using a virtual security testbed for digital forensic reconstruction

Volume 2, Issue 3

149 -- 161Matt Webster, Grant Malcolm. Detection of metamorphic computer viruses using algebraic specification
163 -- 186InSeon Yoo, Ulrich Ultes-Nitsche. Non-signature based virus detection
187 -- 210David de Drézigué, Jean-Paul Fizaine, Nils Hansma. In-depth analysis of the viral threats with documents
211 -- 229Wing Wong, Mark Stamp. Hunting for metamorphic engines
231 -- 239D. Krishna Sandeep Reddy, Arun K. Pujari. ::::N::::-gram analysis for computer virus detection

Volume 2, Issue 2

99 -- 0Eric Filiol. Foreword
101 -- 107Daniel Reynaud-Plantey. The Java Mobile Risk
109 -- 119Sampo Töyssy, Marko Helenius. About malicious software in smartphones
121 -- 133Christos Xenakis. Malicious actions against the GPRS technology
135 -- 147Jose Andre Morales, Peter J. Clarke, Yi Deng, B. M. Golam Kibria. Testing and evaluating virus detectors for handheld devices

Volume 2, Issue 1

1 -- 2Vlasti Broucek, Eric Filiol, Paul Turner. Foreword
3 -- 12Vlasti Broucek, Paul Turner. Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research
13 -- 20Sarah Gordon, Richard Ford. On the definition and classification of cybercrime
21 -- 34Gerald Tripp. A Parallel String Matching Engine for use in High Speed Network Intrusion Detection Systems
35 -- 50Eric Filiol. Malware Pattern Scanning Schemes Secure Against Black-box Analysis
51 -- 65Sébastien Josse. How to Assess the Effectiveness of your Anti-virus?
67 -- 77Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda. Dynamic Analysis of Malicious Code
79 -- 85John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.. Anti-disassembly using Cryptographic Hash Functions
87 -- 97Baris Kayayurt, Tugkan Tuglular. End-to-end security implementation for mobile devices using TLS protocol