1.9(top 20%)
impact factor
154(top 50%)
papers
4.3K(top 20%)
citations
33(top 20%)
h-index
1.9(top 50%)
impact factor
169
all documents
4.4K
doc citations
61(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1Dynamic Analysis of Malicious CodeJournal in Computer Virology2006210
2Graph-based malware detection using dynamic analysisJournal in Computer Virology2011209
3Hunting for metamorphic enginesJournal in Computer Virology2006195
4On the definition and classification of cybercrimeJournal in Computer Virology2006177
5Behavioral detection of malware: from a survey towards an established taxonomyJournal in Computer Virology2008166
6Malware phylogeny generation using permutations of codeJournal in Computer Virology2005155
7Malware classification based on call graph clusteringJournal in Computer Virology2011145
8An intelligent PE-malware detection system based on association miningJournal in Computer Virology2008141
9Comparative analysis of various ransomware viriiJournal in Computer Virology2010139
10Code obfuscation techniques for metamorphic virusesJournal in Computer Virology2008129
11Opcode graph similarity and metamorphic detectionJournal in Computer Virology2012128
12N-gram analysis for computer virus detectionJournal in Computer Virology2006105
13Hunting for undetectable metamorphic virusesJournal in Computer Virology201198
14Language models for detection of unknown attacks in network trafficJournal in Computer Virology200787
15Malware behaviour analysisJournal in Computer Virology200887
16Profile hidden Markov models and metamorphic virus detectionJournal in Computer Virology200981
17Malware detection using assembly and API call sequencesJournal in Computer Virology201176
18SBMDS: an interpretable string based malware detection system using SVM ensemble with baggingJournal in Computer Virology200969
19Malware Pattern Scanning Schemes Secure Against Black-box AnalysisJournal in Computer Virology200667
20Enhancing web browser security against malware extensionsJournal in Computer Virology200861
21Unknown malcode detection and the imbalance problemJournal in Computer Virology200961
22Shadow attacks: automatically evading system-call-behavior based malware detectionJournal in Computer Virology201260
23Comparing files using structural entropyJournal in Computer Virology201156
24Developing a Trojan applets in a smart cardJournal in Computer Virology201048
25A general definition of malwareJournal in Computer Virology201047
26Reducing the window of opportunity for Android malware Gotta catch ’em allJournal in Computer Virology201244
27About malicious software in smartphonesJournal in Computer Virology200642
28Evaluation methodology and theoretical model for antiviral behavioural detection strategiesJournal in Computer Virology200741
29On the possibility of practically obfuscating programs towards a unified perspective of code protectionJournal in Computer Virology200740
30SinFP, unification of active and passive operating system fingerprintingJournal in Computer Virology201040
31Advances in password crackingJournal in Computer Virology200838
32Architecture of a morphological malware detectorJournal in Computer Virology200937
33Enabling automated threat response through the use of a dynamic security policyJournal in Computer Virology200735
34Network-level polymorphic shellcode detection using emulationJournal in Computer Virology200734
35Set-up and deployment of a high-interaction honeypot: experiment and lessons learnedJournal in Computer Virology201132
36Windows memory forensicsJournal in Computer Virology200831
37On JavaScript Malware and related threatsJournal in Computer Virology200831
38Open Problems in Computer VirologyJournal in Computer Virology200630
39Measuring virtual machine detection in malware using DSD tracerJournal in Computer Virology201030
40Removing web spam links from search engine resultsJournal in Computer Virology201130
41Usability evaluation of anti-phishing toolbarsJournal in Computer Virology200729
42A statistical model for undecidable viral detectionJournal in Computer Virology200728
43A practical approach on clustering malicious PDF documentsJournal in Computer Virology201228
44Automatic binary deobfuscationJournal in Computer Virology201027
45Testing and evaluating virus detectors for handheld devicesJournal in Computer Virology200626
46Formalisation and implementation aspects of K-ary (malicious) codesJournal in Computer Virology200726
47On Abstract Computer Virology from a Recursion Theoretic PerspectiveJournal in Computer Virology200625
48ARDrone corruptionJournal in Computer Virology201225
49Software transformations to improve malware detectionJournal in Computer Virology200723
50Discovering and exploiting 802.11 wireless driver vulnerabilitiesJournal in Computer Virology200823