default search action
Journal of Computer Virology and Hacking Techniques, Volume 10
Volume 10, Number 1, February 2014
- Osamah L. Barakat, Shaiful J. Hashim, Raja Syamsul Azmir Raja Abdullah, Abdul Rahman Ramli, Fazirulhisyam Hashim, Khairulmizam Samsudin, Mahmud Ab Rahman:
Malware analysis performance enhancement using cloud computing. 1-10 - Gerardo Canfora, Antonio Niccolò Iannaccone, Corrado Aaron Visaggio:
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics. 11-27 - Julian L. Rrushi, Ali A. Ghorbani:
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management. 29-51 - Sayali Deshpande, Young Hee Park, Mark Stamp:
Eigenvalue analysis for metamorphic detection. 53-65
Volume 10, Number 2, May 2014
- Sang-Yeob Oh, Supratip Ghose, Hye-Jung Jang, Kyungyong Chung:
Recent trends in Mobile Communication Systems. 67-70 - Il-Kyoung Kwon, Sang-Yong Lee:
Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies. 71-80 - Sung-Ho Sim, Su-Jin Baek:
A study on scalable information matching system based on web service information. 81-88 - So Hyeon Kim, Hyun Park, Hyo-Chan Bang, Do-Hyeun Kim:
An indoor location tracking based on mobile RFID for smart exhibition service. 89-96 - Taehan Kim, Hyunmin Park, Bokeun Kim:
Heuristic estimation of network capacity and spectrum requirement. 97-100 - Man Ki Kim, You Sik Hong:
Implementation of a web-based smart electronic needle system. 101-108 - Dae-Eun Lim, Tae-Sung Kim:
Modeling discovery and removal of security vulnerabilities in software system using priority queueing models. 109-114 - Young Jin Choi, Gyu Jang Lee, Jong-Hei Ra, Whiejong M. Han:
Adjusting context-aware RFID in health screening center. 115-118 - Dong-Hwan Kim, Park Kyung-Hye, Gye-woon Choi, Kyung-jin Min:
A study on the factors that affect the adoption of Smart Water Grid. 119-128 - Hyochang Ahn, Yong-Hwan Lee, June-Hwan Lee, Han-Jin Cho:
A low complexity image stitching using advanced feature matching in mobile environments. 129-136 - Sam Jin Jeong:
A loop splitting method for single loops with non-uniform dependences. 137-143 - Myoung-Kyu Choi, Kyeong-Seok Han:
A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments. 145-156 - Sang Gyun Kim, Jong Sun Park:
Legal limits of search and seizure for digital forensic in Korea. 157-163
Volume 10, Number 3, August 2014
- Ciprian Oprisa, George Cabau, Adrian Colesa:
Automatic code features extraction using bio-inspired algorithms. 165-176 - Teja Tamboli, Thomas H. Austin, Mark Stamp:
Metamorphic code generation from LLVM bytecode. 177-187 - Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin:
Detection of shellcodes in drive-by attacks using kernel machines. 189-203 - Eric Mahe, Jean-Marie Chauvet:
Secrets from the GPU - True random bit generation and faster Diffie-Hellman for systemic cryptography. 205-210 - Josselin Feist, Laurent Mounier, Marie-Laure Potet:
Statically detecting use after free on binary code. 211-217
Volume 10, Number 4, November 2014
- Mathieu Cunche:
I know your MAC address: targeted tracking of individual using Wi-Fi. 219-227 - Jagdish Prasad Achara, James-Douglass Lefruit, Vincent Roca, Claude Castelluccia:
Detecting privacy leaks in the RATP App: how we proceeded and what we found. 229-238 - Guillaume Bouffard, Jean-Louis Lanet:
Reversing the operating system of a Java based smart card. 239-253 - Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero:
Black-box forensic and antiforensic characteristics of solid-state drives. 255-271 - Nikki Benecke Brandt, Mark Stamp:
Automating NFC message sending for good and evil. 273-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.