Journals in DBLP
Rainer Fahs , Vlasti Broucek Letter from the EICAR Chairman. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:61- [Journal ] Vlasti Broucek , Paul Turner Foreword. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:63-64 [Journal ] Eric Filiol , Sébastien Josse A statistical model for undecidable viral detection. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:65-74 [Journal ] Eric Filiol Formalisation and implementation aspects of K -ary (malicious) codes. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:75-86 [Journal ] Markos Avlonitis , Emmanouil Magkos , Michalis Stefanidakis , Vassilios Chrissikopoulos A spatial stochastic model for worm propagation: scale effects. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:87-92 [Journal ] Attila Ondi , Richard Ford How good is good enough? Metrics for worm/anti-worm evaluation. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:93-101 [Journal ] Vinoo Thomas , Nitin Jyoti Bot countermeasures. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:103-111 [Journal ] Sébastien Josse Rootkit detection from outside the Matrix. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:113-123 [Journal ] Gerald Tripp Regular expression matching with input compression: a hardware design for use within network intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:125-134 [Journal ] Jörg Preuß , Steven Furnell , Maria Papadaki Considering the potential of criminal profiling to combat hacking. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:135-141 [Journal ] Lizzie Coles-Kemp , Richard E. Overill On the role of the Facilitator in information security risk assessment. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:143-148 [Journal ] Urs E. Gattiker Bologna process revisited: educating information security and malware experts. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:149-161 [Journal ] Linfeng Li , Marko Helenius Usability evaluation of anti-phishing toolbars. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:163-184 [Journal ] Oliver Jorns , Oliver Jung , Gerald Quirchmayr Transaction pseudonyms in mobile environments. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:185-194 [Journal ]