researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Journal in Computer Virology
Home
Index
Info
Volume
Volume
9
, Issue
4
171
--
178
Marius Barat
,
Dumitru-Bogdan Prelipcean
,
Dragos Teodor Gavrilut
.
A study on common malware families evolution in 2012
179
--
192
Donabelle Baysa
,
Richard M. Low
,
Mark Stamp
.
Structural entropy and metamorphic malware
193
--
204
Ying Cao
,
Qiguang Miao
,
Jiachen Liu
,
Lin Gao
.
Abstracting minimal security-relevant behaviors for malware analysis
205
--
214
Cristina Vatamanu
,
Dragos Gavrilut
,
Razvan-Mihai Benchea
.
Building a practical and reliable classifier for malware detection
Volume
9
, Issue
3
109
--
123
Arun Lakhotia
,
Andrew Walenstein
,
Craig Miles
,
Anshuman Singh
.
VILO: a rapid learning nearest-neighbor classifier for malware triage
125
--
135
Jonathan Dechaux
.
The Office Demon: Minos
137
--
157
Radhouane Chouchane
,
Natalia Stakhanova
,
Andrew Walenstein
,
Arun Lakhotia
.
Detecting machine-morphed malware variants via engine attribution
159
--
170
Gayathri Shanmugam
,
Richard M. Low
,
Mark Stamp
.
Simple substitution distance and metamorphic detection
Volume
9
, Issue
2
49
--
58
Sudarshan Madenur Sridhara
,
Mark Stamp
.
Metamorphic worm that carries its own morphing engine
59
--
63
Arnim Eijkhoudt
,
Tristan Suerink
.
Uforia: Universal forensic indexer and analyzer
65
--
76
Valentin Hamon
.
Malicious URI resolving in PDF documents
77
--
93
Mojtaba Eskandari
,
Zeinab Khorshidpour
,
Sattar Hashemi
.
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
95
--
107
Baptiste David
,
Dorian Larget
,
Thibaut Scherrer
.
The security of databases: the Access case
Volume
9
, Issue
1
1
--
14
Annie H. Toderici
,
Mark Stamp
.
Chi-squared distance and metamorphic virus detection
15
--
26
François Goichon
,
Guillaume Salagnac
,
Pierre Parrend
,
Stéphane Frénot
.
Static vulnerability detection in Java service-oriented components
27
--
33
Vlasti Broucek
,
Paul Turner
.
Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective
35
--
47
Ming Xu
,
Lingfei Wu
,
Shuhui Qi
,
Jian Xu
,
Haiping Zhang
,
Yizhi Ren
,
Ning Zheng
.
A similarity metric method of obfuscated malware using function-call graph