Skip to main content
main-content
Top

Journal

Journal of Computer Virology and Hacking Techniques

Journal of Computer Virology and Hacking Techniques 1/2010

Issue 1/2010

Table of Contents ( 6 Articles )

01-02-2010 | Original Paper | Issue 1/2010

Applied parallel coordinates for logs and network traffic attack analysis

Sebastien Tricaud, Philippe Saadé

01-02-2010 | Original Paper | Issue 1/2010

Analysis of a scanning model of worm propagation

Ezzat Kirmani, Cynthia S. Hood

01-02-2010 | Original Paper | Issue 1/2010

New data mining technique to enhance IDS alarms quality

Safaa O. Al-Mamory, Hongli Zhang

01-02-2010 | Original Paper | Issue 1/2010

Advanced fuzzing in the VoIP space

Humberto Abdelnur, Radu State, Olivier Festor

01-02-2010 | Eicar 2008 Extended Version | Issue 1/2010

Simulating malware with MAlSim

Rafał Leszczyna, Igor Nai Fovino, Marcelo Masera

01-02-2010 | Eicar 2008 extended version | Issue 1/2010

Comparative analysis of various ransomware virii

Alexandre Gazet

Current Publications

Premium Partner

    Image Credits