Journal: Journal in Computer Virology

Volume 7, Issue 4

233 -- 245Joris Kinable, Orestis Kostakis. Malware classification based on call graph clustering
247 -- 258Blake Anderson, Daniel Quist, Joshua Neil, Curtis Storlie, Terran Lane. Graph-based malware detection using dynamic analysis
259 -- 265Ivan Sorokin. Comparing files using structural entropy
267 -- 277FuYong Zhang, Deyu Qi. Run-time malware detection based on positive selection
279 -- 295Irfan Ahmed, Kyung-suk Lhee. Classification of packet contents for malware detection

Volume 7, Issue 3

173 -- 188Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter. Filter-resistant code injection on ARM
189 -- 199Vlasti Broucek, Paul Turner, Mark Zimmerli. Managing university internet access: balancing the need for security, privacy and digital evidence
201 -- 214Da Lin, Mark Stamp. Hunting for undetectable metamorphic viruses
215 -- 219Iain Sutherland, Gareth Davies, Andrew Blyth. Malware and steganography in hard disk firmware
221 -- 232Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel. Heliza: talking dirty to the attackers

Volume 7, Issue 2

95 -- 105Hassan Khan, Fauzan Mirza, Syed Ali Khayam. Determining malicious executable distinguishing attributes and low-complexity detection
107 -- 119Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala. Malware detection using assembly and API call sequences
121 -- 131Daniel Quist, Lorie M. Liebrock, Joshua Neil. Improving antivirus accuracy with hypervisor assisted analysis
133 -- 142Dai Geng, Tomohiro Odaka, Jousuke Kuroiwa, Hisakazu Ogura. An ::::N::::-Gram and STF-IDF model for masquerade detection in a UNIX environment
143 -- 157Vincent Nicomette, Mohamed Kaåniche, Eric Alata, Matthieu Herrb. Set-up and deployment of a high-interaction honeypot: experiment and lessons learned
159 -- 172Syed Ali Khayam, Ayesha Binte Ashfaq, Hayder Radha. Joint network-host based malware detection using information-theoretic tools

Volume 7, Issue 1

1 -- 21Éric Lacombe, Vincent Nicomette, Yves Deswarte. Enforcing kernel constraints by hardware-assisted virtualization
23 -- 49Anthony Desnos, Eric Filiol, Ivan Lefou. Detecting (and creating !) a HVM rootkit (aka BluePill-like)
51 -- 62Manuel Egele, Clemens Kolbitsch, Christian Platzer. Removing web spam links from search engine results
63 -- 81Ayesha Binte Ashfaq, Muhammad Qasim Ali, Syed Ali Khayam. Accuracy improving guidelines for network anomaly detection systems
83 -- 93Julien Desfossez, Justine Dieppedale, Gabriel Girard. Stealth malware analysis from kernel space with Kolumbo