About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Journal in Computer Virology
›
top-articles
Journal in Computer Virology
1.9
(top 20%)
impact factor
154
(top 50%)
papers
4.3K
(top 20%)
citations
33
(top 20%)
h
-index
1.9
(top 50%)
impact factor
169
all documents
4.4K
doc citations
61
(top 20%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Dynamic Analysis of Malicious Code
Journal in Computer Virology
2006
210
2
Graph-based malware detection using dynamic analysis
Journal in Computer Virology
2011
209
3
Hunting for metamorphic engines
Journal in Computer Virology
2006
195
4
On the definition and classification of cybercrime
Journal in Computer Virology
2006
177
5
Behavioral detection of malware: from a survey towards an established taxonomy
Journal in Computer Virology
2008
166
6
Malware phylogeny generation using permutations of code
Journal in Computer Virology
2005
155
7
Malware classification based on call graph clustering
Journal in Computer Virology
2011
145
8
An intelligent PE-malware detection system based on association mining
Journal in Computer Virology
2008
141
9
Comparative analysis of various ransomware virii
Journal in Computer Virology
2010
139
10
Code obfuscation techniques for metamorphic viruses
Journal in Computer Virology
2008
129
11
Opcode graph similarity and metamorphic detection
Journal in Computer Virology
2012
128
12
N-gram analysis for computer virus detection
Journal in Computer Virology
2006
105
13
Hunting for undetectable metamorphic viruses
Journal in Computer Virology
2011
98
14
Language models for detection of unknown attacks in network traffic
Journal in Computer Virology
2007
87
15
Malware behaviour analysis
Journal in Computer Virology
2008
87
16
Profile hidden Markov models and metamorphic virus detection
Journal in Computer Virology
2009
81
17
Malware detection using assembly and API call sequences
Journal in Computer Virology
2011
76
18
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging
Journal in Computer Virology
2009
69
19
Malware Pattern Scanning Schemes Secure Against Black-box Analysis
Journal in Computer Virology
2006
67
20
Enhancing web browser security against malware extensions
Journal in Computer Virology
2008
61
21
Unknown malcode detection and the imbalance problem
Journal in Computer Virology
2009
61
22
Shadow attacks: automatically evading system-call-behavior based malware detection
Journal in Computer Virology
2012
60
23
Comparing files using structural entropy
Journal in Computer Virology
2011
56
24
Developing a Trojan applets in a smart card
Journal in Computer Virology
2010
48
25
A general definition of malware
Journal in Computer Virology
2010
47
26
Reducing the window of opportunity for Android malware Gotta catch ’em all
Journal in Computer Virology
2012
44
27
About malicious software in smartphones
Journal in Computer Virology
2006
42
28
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
Journal in Computer Virology
2007
41
29
On the possibility of practically obfuscating programs towards a unified perspective of code protection
Journal in Computer Virology
2007
40
30
SinFP, unification of active and passive operating system fingerprinting
Journal in Computer Virology
2010
40
31
Advances in password cracking
Journal in Computer Virology
2008
38
32
Architecture of a morphological malware detector
Journal in Computer Virology
2009
37
33
Enabling automated threat response through the use of a dynamic security policy
Journal in Computer Virology
2007
35
34
Network-level polymorphic shellcode detection using emulation
Journal in Computer Virology
2007
34
35
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned
Journal in Computer Virology
2011
32
36
Windows memory forensics
Journal in Computer Virology
2008
31
37
On JavaScript Malware and related threats
Journal in Computer Virology
2008
31
38
Open Problems in Computer Virology
Journal in Computer Virology
2006
30
39
Measuring virtual machine detection in malware using DSD tracer
Journal in Computer Virology
2010
30
40
Removing web spam links from search engine results
Journal in Computer Virology
2011
30
41
Usability evaluation of anti-phishing toolbars
Journal in Computer Virology
2007
29
42
A statistical model for undecidable viral detection
Journal in Computer Virology
2007
28
43
A practical approach on clustering malicious PDF documents
Journal in Computer Virology
2012
28
44
Automatic binary deobfuscation
Journal in Computer Virology
2010
27
45
Testing and evaluating virus detectors for handheld devices
Journal in Computer Virology
2006
26
46
Formalisation and implementation aspects of K-ary (malicious) codes
Journal in Computer Virology
2007
26
47
On Abstract Computer Virology from a Recursion Theoretic Perspective
Journal in Computer Virology
2006
25
48
ARDrone corruption
Journal in Computer Virology
2012
25
49
Software transformations to improve malware detection
Journal in Computer Virology
2007
23
50
Discovering and exploiting 802.11 wireless driver vulnerabilities
Journal in Computer Virology
2008
23
site/software ©
exaly
; All materials licenced under
CC by-SA
.