researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Journal in Computer Virology
Home
Index
Info
Volume
Volume
8
, Issue
4
117
--
131
Axelle Apvrille
.
Symbian worm Yxes: towards mobile botnets?
133
--
140
Mihai Cimpoesu
,
Dragos Gavrilut
,
Adrian Popescu
.
The proactivity of Perceptron derived algorithms in malware detection
141
--
149
Anoirel Issa
.
Anti-virtual machines and emulations
151
--
163
Cristina Vatamanu
,
Dragos Gavrilut
,
Razvan Benchea
.
A practical approach on clustering malicious PDF documents
Volume
8
, Issue
3
73
--
84
Craig Miles
,
Arun Lakhotia
,
Andrew Walenstein
.
In situ reuse of logically extracted functional components
85
--
97
P. Ranjith
,
Chandran Priya
,
Kaleeswaran Shalini
.
On covert channels between virtual machines
99
--
108
Mojtaba Eskandari
,
Sattar Hashemi
.
ECFGM: enriched control flow graph miner for unknown vicious infected code detection
109
--
116
Mihai Cimpoesu
,
Claudiu Popa
.
Dronezilla: designing an accurate malware behavior retrieval system
Volume
8
, Issue
1-2
1
--
13
Weiqin Ma
,
Pu Duan
,
Sanmin Liu
,
Guofei Gu
,
Jyh-Charn Liu
.
Shadow attacks: automatically evading system-call-behavior based malware detection
15
--
27
Eddy Deligne
.
ARDrone corruption
29
--
36
Vincent Guyot
.
Smart card, the stealth leaker
37
--
52
Neha Runwal
,
Richard M. Low
,
Mark Stamp
.
Opcode graph similarity and metamorphic detection
53
--
60
John Aycock
.
What's in a name. . . generator?
61
--
71
Axelle Apvrille
,
Tim Strazzere
.
Reducing the window of opportunity for Android malware Gotta catch 'em all