![](/images/ico/ico_close.png)
![](/images/ico/ico3.png)
Publisher: Springer Publishing Company
Founded in: 2006
Total resources: 4
E-ISSN: 1772-9904
ISSN: 1772-9890
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Journal in Computer Virology
Menu
![](/images/ico/ico5.png)
Hunting for undetectable metamorphic viruses
Journal in Computer Virology , Vol. 7, Iss. 3, 2011-08 , pp.![](/images/ico/ico5.png)
Heliza: talking dirty to the attackers
Journal in Computer Virology , Vol. 7, Iss. 3, 2011-08 , pp.![](/images/ico/ico5.png)
Malware and steganography in hard disk firmware
Journal in Computer Virology , Vol. 7, Iss. 3, 2011-08 , pp.![](/images/ico/ico5.png)
Filter-resistant code injection on ARM
Journal in Computer Virology , Vol. 7, Iss. 3, 2011-08 , pp.![](/images/ico/ico5.png)
Managing university internet access: balancing the need for security, privacy and digital evidence
Journal in Computer Virology , Vol. 7, Iss. 3, 2011-08 , pp.![](/images/ico/ico5.png)
Accuracy improving guidelines for network anomaly detection systems
Journal in Computer Virology , Vol. 7, Iss. 1, 2011-02 , pp.![](/images/ico/ico5.png)
Enforcing kernel constraints by hardware-assisted virtualization
Journal in Computer Virology , Vol. 7, Iss. 1, 2011-02 , pp.![](/images/ico/ico5.png)
Removing web spam links from search engine results
Journal in Computer Virology , Vol. 7, Iss. 1, 2011-02 , pp.![](/images/ico/ico5.png)
Detecting (and creating !) a HVM rootkit (aka BluePill-like)
Journal in Computer Virology , Vol. 7, Iss. 1, 2011-02 , pp.![](/images/ico/ico5.png)
Stealth malware analysis from kernel space with Kolumbo
Journal in Computer Virology , Vol. 7, Iss. 1, 2011-02 , pp.