The SCEAS System
Navigation Menu

Journals in DBLP

Journal in Computer Virology
2007, volume: 3, number: 2

  1. Rainer Fahs, Vlasti Broucek
    Letter from the EICAR Chairman. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:61- [Journal]
  2. Vlasti Broucek, Paul Turner
    Foreword. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:63-64 [Journal]
  3. Eric Filiol, Sébastien Josse
    A statistical model for undecidable viral detection. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:65-74 [Journal]
  4. Eric Filiol
    Formalisation and implementation aspects of K -ary (malicious) codes. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:75-86 [Journal]
  5. Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos
    A spatial stochastic model for worm propagation: scale effects. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:87-92 [Journal]
  6. Attila Ondi, Richard Ford
    How good is good enough? Metrics for worm/anti-worm evaluation. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:93-101 [Journal]
  7. Vinoo Thomas, Nitin Jyoti
    Bot countermeasures. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:103-111 [Journal]
  8. Sébastien Josse
    Rootkit detection from outside the Matrix. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:113-123 [Journal]
  9. Gerald Tripp
    Regular expression matching with input compression: a hardware design for use within network intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:125-134 [Journal]
  10. Jörg Preuß, Steven Furnell, Maria Papadaki
    Considering the potential of criminal profiling to combat hacking. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:135-141 [Journal]
  11. Lizzie Coles-Kemp, Richard E. Overill
    On the role of the Facilitator in information security risk assessment. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:143-148 [Journal]
  12. Urs E. Gattiker
    Bologna process revisited: educating information security and malware experts. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:149-161 [Journal]
  13. Linfeng Li, Marko Helenius
    Usability evaluation of anti-phishing toolbars. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:163-184 [Journal]
  14. Oliver Jorns, Oliver Jung, Gerald Quirchmayr
    Transaction pseudonyms in mobile environments. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:185-194 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002