​
Login / Signup
J. Comput. Virol. Hacking Tech.
2013
2017
2019
2024
2013
2024
Keyphrases
Publications
volume 20, number 1, 2024
Mila Dalla Preda
,
Michele Ianni
Exploiting number theory for dynamic software watermarking.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Mohamed Rasslan
,
Mahmoud M. Nasreldin
,
Doaa Abdelrahman
,
Aya Elshobaky
,
Heba Aslan
Networking and cryptography library with a non-repudiation flavor for blockchain.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Akram Khalesi
,
Zahra Ahmadian
Provably minimum data complexity integral distinguisher based on conventional division property.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Santosh Kumar Ravva
,
K. L. N. C. Prakash
,
Sureddi R. M. Krishna
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Hassan Jameel Asghar
,
Benjamin Zi Hao Zhao
,
Muhammad Ikram
,
Giang Linh Duc Nguyen
,
Dali Kaafar
,
Sean Lamont
,
Daniel Coscia
Use of cryptography in malware obfuscation.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Hafiz Usama Ishtiaq
,
Areeb Ahmed Bhutta
,
Adnan Noor Mian
DHCP DoS and starvation attacks on SDN controllers and their mitigation.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Omid Kargarnovin
,
Amir Mahdi Sadeghzadeh
,
Rasool Jalili
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Rohit Dube
Faulty use of the CIC-IDS 2017 dataset in information security research.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Christian Catalano
,
Franco Tommasi
Persistent MobileApp-in-the-Middle (MAitM) attack.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Ritik Mehta
,
Olha Jurecková
,
Mark Stamp
A natural language processing approach to Malware classification.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Grigory B. Marshalko
,
Svetlana Koreshkova
Protection against adversarial attacks with randomization of recognition algorithm.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Vrinda Malhotra
,
Katerina Potika
,
Mark Stamp
A comparison of graph neural networks for malware classification.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Nguyen Minh Tu
,
Viet Hung Nguyen
,
Nathan Shone
Using deep graph learning to improve dynamic analysis-based malware detection in PE files.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Hashida Haidros Rahima Manzil
,
S. Manohar Naik
Android ransomware detection using a novel hamming distance based feature selection.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
Santosh Kumar Ravva
,
K. L. N. C. Prakash
,
Sureddi R. M. Krishna
Partial key exposure attack on RSA using some private key blocks.
J. Comput. Virol. Hacking Tech.
20 (1) (2024)
volume 20, number 2, 2024
François Dupont
A new Shamir's three pass random matrix ciphering mechanism.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Eldar Boltachev
Correction to: Potential cyber threats of adversarial attacks on autonomous driving models.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Jesper Bergman
,
Oliver Popov
Recognition of tor malware and onion services.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Alexander V. Babash
Attacks on the simple substitution cipher with the calculation of their reliability.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Anatoly Konkin
,
Sergey Zapechnikov
Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Evgeniy K. Alekseev
,
Sergey Kyazhin
,
Stanislav Smyshlyaev
The threat of forcing the identical roles for authenticated key establishment protocols.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Sergey Prokopev
Cryptographic protocol conformance testing based on domain-specific state machine.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Alexey Kurochkin
,
Denis Fomin
MGM beyond the birthday bound.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Anna Epishkina
,
Sergey Zapechnikov
,
Anna Belozubova
Historical notes on Russian cryptography.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Rosangela Casolare
,
Stefano Fagnano
,
Giacomo Iadarola
,
Fabio Martinelli
,
Francesco Mercaldo
,
Antonella Santone
Picker Blinder: a framework for automatic injection of malicious inter-app communication.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Giovanni Ciaramella
,
Giacomo Iadarola
,
Fabio Martinelli
,
Francesco Mercaldo
,
Antonella Santone
Explainable Ransomware Detection with Deep Learning Techniques.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Dmitry Zakharov
,
M. Pudovkina
Full round impossible differentials for Feistel ciphers.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
Guillaume Dupont
,
Daniel Ricardo dos Santos
,
Stanislav Dashevskyi
,
Sangavi Vijayakumar
,
Sashaank P. Murali
,
Elisa Costante
,
Jerry den Hartog
,
Sandro Etalle
Demonstration of new attacks on three healthcare network protocols in a lab environment.
J. Comput. Virol. Hacking Tech.
20 (2) (2024)
volume 19, number 3, 2023
Aleksei Kirov
,
Valerii Sizov
Development of a method for targeted monitoring and processing of information security incidents of economic entities.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Anastasia Pereberina
,
Alexey Kostyushko
,
Alexander Tormasov
An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Mark Ermolov
,
Dmitry Sklyarov
,
Maxim Goryachy
Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Nina D. Ivanova
,
Vitaliy G. Ivanenko
Modeling advanced persistent threats using risk matrix methods.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Anatoly Konkin
,
Sergey Zapechnikov
Zero knowledge proof and ZK-SNARK for private blockchains.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Anna Epishkina
,
Nikolay Karapetyants
,
Konstantin Kogos
,
Philip Lebedev
Covert channel limitation via special dummy traffic generating.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Dmitriy Izergin
,
Mikhail Eremeev
,
Shamil Magomedov
Risky model of mobile application presentation.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Julia Bobrysheva
,
Sergey Zapechnikov
Post-quantum security of messengers: secure group chats and continuous key distribution protocols.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
Evgeniy Y. Pavlenko
,
K. V. Vasil'eva
,
Daria S. Lavrova
,
Dmitry P. Zegzhda
Counteraction the cybersecurity threats of the in-vehicle local network.
J. Comput. Virol. Hacking Tech.
19 (3) (2023)
volume 19, number 4, 2023
Yoshihiro Oyama
,
Hirotaka Kokubo
Forced continuation of malware execution beyond exceptions.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Huy Nguyen
,
Fabio Di Troia
,
Genya Ishigaki
,
Mark Stamp
Generative adversarial networks and image-based malware classification.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Mahdi Mahdavi Oliaee
,
Zahra Ahmadian
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Baijnath Kaushik
,
Reya Sharma
,
Kulwant Dhama
,
Akshma Chadha
,
Surbhi Sharma
Performance evaluation of learning models for intrusion detection system using feature selection.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Puya Pakshad
,
Alireza Shameli-Sendi
,
Behzad Khalaji Emamzadeh Abbasi
A security vulnerability predictor based on source code metrics.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Manar Aldaoud
,
Dawood Al-Abri
,
Ahmed Al-Maashri
,
Firdous Kausar
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Leslie F. Sikos
,
Craig Valli
,
Alexander E. Grojek
,
David J. Holmes
,
Samuel G. Wakeling
,
Warren Z. Cabral
,
Nickson M. Karie
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Mouaad Mohy-Eddine
,
Azidine Guezzaz
,
Said Benkirane
,
Mourade Azrour
An effective intrusion detection approach based on ensemble learning for IIoT edge computing.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Enrique Soriano-Salvador
,
Gorka Guardiola Muzquiz
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)
Manmeet Singh
,
Maninder Singh
,
Sanmeet Kaur
Identifying bot infection using neural networks on DNS traffic.
J. Comput. Virol. Hacking Tech.
19 (4) (2023)