Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 25

Content of Issue 9
DOI: 10.3217/jucs-025-09
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes A. Janicki, W. Mazurczyk, X. Luo, D. Ye 1039
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits A. Fedorchenko, E. Doynikova, I. Kotenko 1043
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios Y. Lakhdhar, S. Rekhis, N. Boudriga 1066
Precise Performance Characterization of Antivirus on the File System Operations M.I. Al-Saleh, H.M. Hamdan 1089
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels J. Bieniasz, M. Stępkowska, A. Janicki, K. Szczypiorski 1109
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay H. Tian, M. Huang, C.-C. Chang, Y. Huang, J. Lu, Y. Du 1131
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images M. Huang, M. Xu, T. Qiao, T. Wu, N. Zheng 1151
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach Z.A. Al-Sharif, M.I. Al-Saleh, Y. Jararweh, L. Alawneh, A.S. Shatnawi 1174
Digital Investigation of IoT Devices in the Criminal Scene F. Bouchaud, G. Grimaud, T. Vantroys, P. Buret 1199