Skip to main content

Journal of Computer Virology and Hacking Techniques

Ausgabe 2/2013

Inhalt (5 Artikel)

Original Paper

Metamorphic worm that carries its own morphing engine

Sudarshan Madenur Sridhara, Mark Stamp

Original Paper

Uforia: Universal forensic indexer and analyzer

Arnim Eijkhoudt, Tristan Suerink

Original Paper

Malicious URI resolving in PDF documents

Valentin Hamon

Original Paper

HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection

Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi

Original Paper

The security of databases: the Access case

Baptiste David, Dorian Larget, Thibaut Scherrer

Aktuelle Ausgaben

Scrollen für mehr

Benutzen Sie die Pfeiltasten für mehr

Scrollen oder Pfeiltasten für mehr