Journal in Computer Virology

Titel Veröffentlichungsdatum Sprache Zitate
Graph-based malware detection using dynamic analysis2011/06/08English91
On the definition and classification of cybercrime2006/07/25English84
Hunting for metamorphic engines2006/11/11English83
Dynamic Analysis of Malicious Code2006/05/16English72
Behavioral detection of malware: from a survey towards an established taxonomy2008/02/21English64
Code obfuscation techniques for metamorphic viruses2008/02/21English57
Hunting for undetectable metamorphic viruses2010/12/25English54
An intelligent PE-malware detection system based on association mining2008/02/05English53
Opcode graph similarity and metamorphic detection2012/04/03English53
Malware phylogeny generation using permutations of code2005/09/20English52
Malware classification based on call graph clustering2011/02/03English52
Comparative analysis of various ransomware virii2008/07/04English51
N-gram analysis for computer virus detection2006/11/08English39
Malware detection using assembly and API call sequences2010/04/03English36
Profile hidden Markov models and metamorphic virus detection2008/09/10English36
Comparing files using structural entropy2011/06/08English33
Malware Pattern Scanning Schemes Secure Against Black-box Analysis2006/05/16English32
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging2008/11/26English28
Shadow attacks: automatically evading system-call-behavior based malware detection2011/12/20English28
Unknown malcode detection and the imbalance problem2009/07/11English23
Language models for detection of unknown attacks in network traffic2006/12/19English22
Evaluation methodology and theoretical model for antiviral behavioural detection strategies2006/10/19English21
A general definition of malware2009/09/29English20
Reducing the window of opportunity for Android malware Gotta catch ’em all2012/04/26English19
Malware behaviour analysis2007/12/08English19
A statistical model for undecidable viral detection2007/04/04English17
A practical approach on clustering malicious PDF documents2012/06/15English17
IDS alerts correlation using grammar-based approach2008/08/15English14
Enhancing web browser security against malware extensions2008/01/12English14
Usability evaluation of anti-phishing toolbars2007/05/16English14