MAC based solution for SQL injection Diksha Gautam KumarMadhumita Chatterjee Original Paper 20 July 2014 Pages: 1 - 7
Identifying Android malware using dynamically obtained features Vitor Monte AfonsoMatheus Favero de AmorimPaulo LĂcio de Geus Original Paper 17 October 2014 Pages: 9 - 17
Efficient botnet herding within the Tor network Lachlan Kang Original Paper 29 November 2014 Pages: 19 - 26
An overview of vulnerability assessment and penetration testing techniques Sugandh ShahB. M. Mehtre Original Paper 28 November 2014 Pages: 27 - 49
How to detect the Cuckoo Sandbox and to Strengthen it? Olivier Ferrand Correspondence 04 September 2014 Pages: 51 - 58