Volume 3, Number 1, April 2007
WTCV'06 Special Issue
, Ludovic Mé
: Intrusion detection and virology: an analysis of differences, similarities and complementariness.
Volume 3, Number 2, June 2007
Eicar 2007 Best Academic Papers
: Formalisation and implementation aspects of K -ary (malicious) codes.
: Regular expression matching with input compression: a hardware design for use within network intrusion detection systems.
Urs E. Gattiker
: Bologna process revisited: educating information security and malware experts.
Volume 3, Number 3, August 2007
: B-tree with fixed node size and no minimum degree.
: Secure and advanced unpacking using computer emulation.
Volume 3, Number 4, November 2007