Volume 2,
Number 1,
August 2006
EICAR 2006 Special Issue
- Vlasti Broucek, Eric Filiol, Paul Turner:
Foreword.
1-2
Electronic Edition (link) BibTeX
- Vlasti Broucek, Paul Turner:
Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research.
3-12
Electronic Edition (link) BibTeX
- Sarah Gordon, Richard Ford:
On the definition and classification of cybercrime.
13-20
Electronic Edition (link) BibTeX
- Gerald Tripp:
A Parallel "String Matching Engine" for use in High Speed Network Intrusion Detection Systems.
21-34
Electronic Edition (link) BibTeX
- Eric Filiol:
Malware Pattern Scanning Schemes Secure Against Black-box Analysis.
35-50
Electronic Edition (link) BibTeX
- Sébastien Josse:
How to Assess the Effectiveness of your Anti-virus?
51-65
Electronic Edition (link) BibTeX
- Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda:
Dynamic Analysis of Malicious Code.
67-77
Electronic Edition (link) BibTeX
- John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.:
Anti-disassembly using Cryptographic Hash Functions.
79-85
Electronic Edition (link) BibTeX
- Baris Kayayurt, Tugkan Tuglular:
End-to-end security implementation for mobile devices using TLS protocol.
87-97
Electronic Edition (link) BibTeX
Volume 2,
Number 2,
November 2006
Special Issue on Mobile Malware and Anti-malware Technologies
Volume 2,
Number 3,
December 2006
Volume 2,
Number 4,
February 2007
DIMVA 2006 Special Issue
Copyright © Sun May 17 00:31:45 2009
by Michael Ley (ley@uni-trier.de)