Skip to main content

Journal of Computer Virology and Hacking Techniques

Ausgabe 2/2011

Inhalt (6 Artikel)

Original Paper

Determining malicious executable distinguishing attributes and low-complexity detection

Hassan Khan, Fauzan Mirza, Syed Ali Khayam

Original Paper

Malware detection using assembly and API call sequences

Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala

Original Paper

Improving antivirus accuracy with hypervisor assisted analysis

Daniel Quist, Lorie Liebrock, Joshua Neil

Original Paper

An N-Gram and STF-IDF model for masquerade detection in a UNIX environment

Dai Geng, Thmohiro Odaka, Jousuke Kuroiwa, Hisakazu Ogura

Original Paper

Set-up and deployment of a high-interaction honeypot: experiment and lessons learned

Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb

Original Paper

Joint network-host based malware detection using information-theoretic tools

Syed Ali Khayam, Ayesha Binte Ashfaq, Hayder Radha

Aktuelle Ausgaben

Scrollen für mehr

Benutzen Sie die Pfeiltasten für mehr

Scrollen oder Pfeiltasten für mehr