Pub Date : 2012-04-26DOI: 10.1007/s11416-012-0162-3
A. Apvrille, Tim Strazzere
{"title":"Reducing the window of opportunity for Android malware Gotta catch ’em all","authors":"A. Apvrille, Tim Strazzere","doi":"10.1007/s11416-012-0162-3","DOIUrl":"https://doi.org/10.1007/s11416-012-0162-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-20DOI: 10.1007/s11416-011-0157-5
Weiqin Ma, Pu Duan, Sanmin Liu, G. Gu, Jyh-Charn S. Liu
{"title":"Shadow attacks: automatically evading system-call-behavior based malware detection","authors":"Weiqin Ma, Pu Duan, Sanmin Liu, G. Gu, Jyh-Charn S. Liu","doi":"10.1007/s11416-011-0157-5","DOIUrl":"https://doi.org/10.1007/s11416-011-0157-5","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-01DOI: 10.1007/s11416-011-0154-8
Fuyong Zhang, Qi Deyu
{"title":"Run-time malware detection based on positive selection","authors":"Fuyong Zhang, Qi Deyu","doi":"10.1007/s11416-011-0154-8","DOIUrl":"https://doi.org/10.1007/s11416-011-0154-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-01DOI: 10.1007/s11416-011-0152-x
Blake Anderson, Daniel Quist, Joshua Neil, C. Storlie, T. Lane
{"title":"Graph-based malware detection using dynamic analysis","authors":"Blake Anderson, Daniel Quist, Joshua Neil, C. Storlie, T. Lane","doi":"10.1007/s11416-011-0152-x","DOIUrl":"https://doi.org/10.1007/s11416-011-0152-x","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121964561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-01DOI: 10.1007/s11416-011-0156-6
Irfan Ahmed, K. Lhee
{"title":"Classification of packet contents for malware detection","authors":"Irfan Ahmed, K. Lhee","doi":"10.1007/s11416-011-0156-6","DOIUrl":"https://doi.org/10.1007/s11416-011-0156-6","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1962 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129600349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-01DOI: 10.1007/s11416-010-0148-y
Da Lin, M. Stamp
{"title":"Hunting for undetectable metamorphic viruses","authors":"Da Lin, M. Stamp","doi":"10.1007/s11416-010-0148-y","DOIUrl":"https://doi.org/10.1007/s11416-010-0148-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-01DOI: 10.1007/s11416-010-0150-4
G. Wagener, R. State, A. Dulaunoy, T. Engel
{"title":"Heliza: talking dirty to the attackers","authors":"G. Wagener, R. State, A. Dulaunoy, T. Engel","doi":"10.1007/s11416-010-0150-4","DOIUrl":"https://doi.org/10.1007/s11416-010-0150-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}