About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Journal of Computer Virology and Hacking Techniques
›
top-articles
Journal of Computer Virology and Hacking Techniques
2.0
(top 20%)
impact factor
242
(top 50%)
papers
3.6K
(top 20%)
citations
31
(top 20%)
h
-index
2.1
(top 20%)
impact factor
337
all documents
3.8K
doc citations
52
(top 20%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
A comparison of static, dynamic, and hybrid analysis for malware detection
Journal of Computer Virology and Hacking Techniques
2017
270
2
Analysis of ResNet and GoogleNet models for malware detection
Journal of Computer Virology and Hacking Techniques
2019
139
3
Identifying Android malware using dynamically obtained features
Journal of Computer Virology and Hacking Techniques
2015
131
4
Using convolutional neural networks for classification of malware represented as images
Journal of Computer Virology and Hacking Techniques
2019
122
5
Deciphering malware’s use of TLS (without decryption)
Journal of Computer Virology and Hacking Techniques
2018
119
6
Behavior-based features model for malware detection
Journal of Computer Virology and Hacking Techniques
2016
109
7
Structural entropy and metamorphic malware
Journal of Computer Virology and Hacking Techniques
2013
105
8
An investigation of byte n-gram features for malware classification
Journal of Computer Virology and Hacking Techniques
2018
99
9
Hidden Markov models for malware classification
Journal of Computer Virology and Hacking Techniques
2015
78
10
Graph embedding as a new approach for unknown malware detection
Journal of Computer Virology and Hacking Techniques
2017
77
11
I know your MAC address: targeted tracking of individual using Wi-Fi
Journal of Computer Virology and Hacking Techniques
2014
76
12
Chi-squared distance and metamorphic virus detection
Journal of Computer Virology and Hacking Techniques
2013
68
13
Deep learning for image-based mobile malware detection
Journal of Computer Virology and Hacking Techniques
2020
66
14
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
Journal of Computer Virology and Hacking Techniques
2019
64
15
A graph-based model for malware detection and classification using system-call groups
Journal of Computer Virology and Hacking Techniques
2017
58
16
Metamorphic worm that carries its own morphing engine
Journal of Computer Virology and Hacking Techniques
2013
57
17
Simple substitution distance and metamorphic detection
Journal of Computer Virology and Hacking Techniques
2013
53
18
Statically detecting use after free on binary code
Journal of Computer Virology and Hacking Techniques
2014
53
19
An overview of vulnerability assessment and penetration testing techniques
Journal of Computer Virology and Hacking Techniques
2015
51
20
Intelligent OS X malware threat detection with code inspection
Journal of Computer Virology and Hacking Techniques
2018
49
21
Network malware classification comparison using DPI and flow packet headers
Journal of Computer Virology and Hacking Techniques
2016
44
22
Semantics-aware detection of targeted attacks: a survey
Journal of Computer Virology and Hacking Techniques
2017
43
23
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
Journal of Computer Virology and Hacking Techniques
2013
40
24
Visual malware detection using local malicious pattern
Journal of Computer Virology and Hacking Techniques
2019
40
25
A similarity metric method of obfuscated malware using function-call graph
Journal of Computer Virology and Hacking Techniques
2013
39
26
State of the art of network protocol reverse engineering tools
Journal of Computer Virology and Hacking Techniques
2018
39
27
Convolutional neural networks and extreme learning machines for malware classification
Journal of Computer Virology and Hacking Techniques
2020
39
28
Clustering for malware classification
Journal of Computer Virology and Hacking Techniques
2017
37
29
Image spam analysis and detection
Journal of Computer Virology and Hacking Techniques
2018
37
30
Eigenvalue analysis for metamorphic detection
Journal of Computer Virology and Hacking Techniques
2014
33
31
Identification of malicious android app using manifest and opcode features
Journal of Computer Virology and Hacking Techniques
2017
33
32
Support vector machines and malware detection
Journal of Computer Virology and Hacking Techniques
2016
32
33
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology
Journal of Computer Virology and Hacking Techniques
2017
32
34
Music classification as a new approach for malware detection
Journal of Computer Virology and Hacking Techniques
2019
32
35
Data augmentation and transfer learning to classify malware images in a deep learning context
Journal of Computer Virology and Hacking Techniques
2021
27
36
How to detect the Cuckoo Sandbox and to Strengthen it?
Journal of Computer Virology and Hacking Techniques
2015
26
37
Packer identification using Byte plot and Markov plot
Journal of Computer Virology and Hacking Techniques
2016
26
38
Impeding behavior-based malware analysis via replacement attacks to malware specifications
Journal of Computer Virology and Hacking Techniques
2017
25
39
Experimental analysis of Android malware detection based on combinations of permissions and API-calls
Journal of Computer Virology and Hacking Techniques
2019
25
40
Structural analysis of binary executable headers for malware detection optimization
Journal of Computer Virology and Hacking Techniques
2017
24
41
A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news
Journal of Computer Virology and Hacking Techniques
2017
24
42
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics
Journal of Computer Virology and Hacking Techniques
2014
23
43
Buffer overflow vulnerabilities in CUDA: a preliminary analysis
Journal of Computer Virology and Hacking Techniques
2016
22
44
Dueling hidden Markov models for virus analysis
Journal of Computer Virology and Hacking Techniques
2015
21
45
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions
Journal of Computer Virology and Hacking Techniques
2018
21
46
The duplication issue within the Drebin dataset
Journal of Computer Virology and Hacking Techniques
2018
21
47
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
Journal of Computer Virology and Hacking Techniques
2019
21
48
Authentication scheme for smart learning system in the cloud computing environment
Journal of Computer Virology and Hacking Techniques
2015
20
49
Hunting for metamorphic JavaScript malware
Journal of Computer Virology and Hacking Techniques
2015
20
50
Trends of anti-analysis operations of malwares observed in API call logs
Journal of Computer Virology and Hacking Techniques
2018
20
site/software ©
exaly
; All materials licenced under
CC by-SA
.