2.0(top 20%)
impact factor
242(top 50%)
papers
3.6K(top 20%)
citations
31(top 20%)
h-index
2.1(top 20%)
impact factor
337
all documents
3.8K
doc citations
52(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1A comparison of static, dynamic, and hybrid analysis for malware detectionJournal of Computer Virology and Hacking Techniques2017270
2Analysis of ResNet and GoogleNet models for malware detectionJournal of Computer Virology and Hacking Techniques2019139
3Identifying Android malware using dynamically obtained featuresJournal of Computer Virology and Hacking Techniques2015131
4Using convolutional neural networks for classification of malware represented as imagesJournal of Computer Virology and Hacking Techniques2019122
5Deciphering malware’s use of TLS (without decryption)Journal of Computer Virology and Hacking Techniques2018119
6Behavior-based features model for malware detectionJournal of Computer Virology and Hacking Techniques2016109
7Structural entropy and metamorphic malwareJournal of Computer Virology and Hacking Techniques2013105
8An investigation of byte n-gram features for malware classificationJournal of Computer Virology and Hacking Techniques201899
9Hidden Markov models for malware classificationJournal of Computer Virology and Hacking Techniques201578
10Graph embedding as a new approach for unknown malware detectionJournal of Computer Virology and Hacking Techniques201777
11I know your MAC address: targeted tracking of individual using Wi-FiJournal of Computer Virology and Hacking Techniques201476
12Chi-squared distance and metamorphic virus detectionJournal of Computer Virology and Hacking Techniques201368
13Deep learning for image-based mobile malware detectionJournal of Computer Virology and Hacking Techniques202066
14A Cyber-Kill-Chain based taxonomy of crypto-ransomware featuresJournal of Computer Virology and Hacking Techniques201964
15A graph-based model for malware detection and classification using system-call groupsJournal of Computer Virology and Hacking Techniques201758
16Metamorphic worm that carries its own morphing engineJournal of Computer Virology and Hacking Techniques201357
17Simple substitution distance and metamorphic detectionJournal of Computer Virology and Hacking Techniques201353
18Statically detecting use after free on binary codeJournal of Computer Virology and Hacking Techniques201453
19An overview of vulnerability assessment and penetration testing techniquesJournal of Computer Virology and Hacking Techniques201551
20Intelligent OS X malware threat detection with code inspectionJournal of Computer Virology and Hacking Techniques201849
21Network malware classification comparison using DPI and flow packet headersJournal of Computer Virology and Hacking Techniques201644
22Semantics-aware detection of targeted attacks: a surveyJournal of Computer Virology and Hacking Techniques201743
23HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detectionJournal of Computer Virology and Hacking Techniques201340
24Visual malware detection using local malicious patternJournal of Computer Virology and Hacking Techniques201940
25A similarity metric method of obfuscated malware using function-call graphJournal of Computer Virology and Hacking Techniques201339
26State of the art of network protocol reverse engineering toolsJournal of Computer Virology and Hacking Techniques201839
27Convolutional neural networks and extreme learning machines for malware classificationJournal of Computer Virology and Hacking Techniques202039
28Clustering for malware classificationJournal of Computer Virology and Hacking Techniques201737
29Image spam analysis and detectionJournal of Computer Virology and Hacking Techniques201837
30Eigenvalue analysis for metamorphic detectionJournal of Computer Virology and Hacking Techniques201433
31Identification of malicious android app using manifest and opcode featuresJournal of Computer Virology and Hacking Techniques201733
32Support vector machines and malware detectionJournal of Computer Virology and Hacking Techniques201632
33Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodologyJournal of Computer Virology and Hacking Techniques201732
34Music classification as a new approach for malware detectionJournal of Computer Virology and Hacking Techniques201932
35Data augmentation and transfer learning to classify malware images in a deep learning contextJournal of Computer Virology and Hacking Techniques202127
36How to detect the Cuckoo Sandbox and to Strengthen it?Journal of Computer Virology and Hacking Techniques201526
37Packer identification using Byte plot and Markov plotJournal of Computer Virology and Hacking Techniques201626
38Impeding behavior-based malware analysis via replacement attacks to malware specificationsJournal of Computer Virology and Hacking Techniques201725
39Experimental analysis of Android malware detection based on combinations of permissions and API-callsJournal of Computer Virology and Hacking Techniques201925
40Structural analysis of binary executable headers for malware detection optimizationJournal of Computer Virology and Hacking Techniques201724
41A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online newsJournal of Computer Virology and Hacking Techniques201724
42Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristicsJournal of Computer Virology and Hacking Techniques201423
43Buffer overflow vulnerabilities in CUDA: a preliminary analysisJournal of Computer Virology and Hacking Techniques201622
44Dueling hidden Markov models for virus analysisJournal of Computer Virology and Hacking Techniques201521
45Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructionsJournal of Computer Virology and Hacking Techniques201821
46The duplication issue within the Drebin datasetJournal of Computer Virology and Hacking Techniques201821
47Security of controlled manufacturing systems in the connected factory: the case of industrial robotsJournal of Computer Virology and Hacking Techniques201921
48Authentication scheme for smart learning system in the cloud computing environmentJournal of Computer Virology and Hacking Techniques201520
49Hunting for metamorphic JavaScript malwareJournal of Computer Virology and Hacking Techniques201520
50Trends of anti-analysis operations of malwares observed in API call logsJournal of Computer Virology and Hacking Techniques201820