no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
About long period sequences
|
Fomichev, V. M. |
|
|
18 |
3 |
p. 205-213 |
article |
2 |
An approach to dynamic malware analysis based on system and application code split
|
Pereberina, Anastasia |
|
|
18 |
3 |
p. 231-241 |
article |
3 |
An efficient IDS in cloud environment using feature selection based on DM algorithm
|
Ghosh, Partha |
|
|
18 |
3 |
p. 243-258 |
article |
4 |
Attacking TrustZone on devices lacking memory protection
|
Stajnrod, Ron |
|
|
18 |
3 |
p. 259-269 |
article |
5 |
Detection and robustness evaluation of android malware classifiers
|
Anupama, M. L. |
|
|
18 |
3 |
p. 147-170 |
article |
6 |
2Faces: a new model of malware based on dynamic compiling and reflection
|
Casolare, Rosangela |
|
|
18 |
3 |
p. 215-230 |
article |
7 |
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
|
Ling, Yeong Tyng |
|
|
18 |
3 |
p. 183-203 |
article |
8 |
Partially identified Babassu cipher and attack on it
|
Babash, A. V. |
|
|
18 |
3 |
p. 271-274 |
article |
9 |
Role based access control using identity and broadcast based encryption for securing cloud data
|
Saxena, Urvashi Rahul |
|
|
18 |
3 |
p. 171-182 |
article |
10 |
XOR ciphers model and the attack to it
|
Babash, A. V. |
|
|
18 |
3 |
p. 275-283 |
article |