Improving security and performance of an Ad Hoc network through a multipath routing strategy Hervé AiacheFrançois HaettelCédric Tavernier Original Paper 25 January 2008 Pages: 267 - 278
Malware behaviour analysis Gérard WagenerRadu StateAlexandre Dulaunoy Original Paper 08 December 2007 Pages: 279 - 287
Formal affordance-based models of computer virus reproduction Matt WebsterGrant Malcolm Original Paper 30 January 2008 Pages: 289 - 306
Constructing malware normalizers using term rewriting Andrew WalensteinRachit MathurArun Lakhotia Original Paper 24 January 2008 Pages: 307 - 322
An intelligent PE-malware detection system based on association mining Yanfang YeDingding WangQingshan Jiang Original Paper 05 February 2008 Pages: 323 - 334
A boosting ensemble for the recognition of code sharing in malware Stanley J. BarrSamuel J. CardmanDavid M. Martin Jr. Original Paper 22 April 2008 Pages: 335 - 345
SQL infections through RFID Anthonius SulaimanSrinivas MukkamalaAndrew Sung Invited Paper 18 December 2007 Pages: 347 - 356