Publications

scientist
Ing. Jean Rosemond Dora, PhD.

Publications for year 2025

On this page, you can search the on-line database of the Central Library of the SAS for the publications.
Select year

Publications

  • DORA, Jean Rosemond - HLUCHÝ, Ladislav** - STAŇO, Michal**. In-memory shellcode runner detection in internet of things (IoT) networks: a lightweight behavioral and semantic analysis framework. In Sensors, 2025, vol. 25, no. 17, art. no. 5425. (2024: 3.5 - IF, Q2 - JCR, 0.764 - SJR, Q1 - SJR). ISSN 1424-8220. Dostupné na: https://doi.org/10.3390/s25175425 Typ: ADCA
    Citations:
    [1.1] RAI, Andri - IM, Eul Gyu. MemCatcher: An In-Depth Analysis Approach to Detect In-Memory Malware. In APPLIED SCIENCES-BASEL, 2025, vol. 15, no. 21, art. no. 11800. Dostupné na: https://doi.org/10.3390/app152111800, Registrované v: WOS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Attacks on active directory - Kerberos delegation : exploitation of active directory using Kerberos constrained delegation. In 6th IEEE International Symposium on Logistics and Industrial Informatics : LINDI 2024. Proceedings. - Danvers : IEEE, 2024, p. 103-108. ISBN 979-8-3315-1620-8. Dostupné na: https://doi.org/10.1109/LINDI63813.2024.10820404 (LINDI 2024 : IEEE international symposium on logistics and industrial informatics.) Typ: ADMB
    Citations:
    [1.2] ZHAO, Hongyang - LIN, Yuxiang. Research on Domain Privilege Escalation Mechanism Based on sAMAccountName Spoofing. In 2025 10th International Symposium on Advances in Electrical Electronics and Computer Engineering Isaeece 2025, 2025-01-01, pp. 658-662. ISBN [9798331513382]. Dostupné na: https://doi.org/10.1109/ISAEECE66033.2025.11160172, Registrované v: SCOPUS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Advanced techniques to execute a shellcode in Word memory. In 29th IEEE international conference on intelligent engineering systems 2025 : INES 2025. Proceedings, 2025, p. 359-364. ISSN 1562-5850. Dostupné na: https://doi.org/10.1109/INES67149.2025.11078202 (INES 2025 : IEEE international conference on intelligent engineering systems 2025.) Typ: ADMB
    Citations:
    [3.1] HUANG, G.-C. - LAI, T.-H. Legacy code, live risk: Empirical evidence of malware detection gaps. In Applied Sciences. 2025, vol. 15, no. 22, pp. 1-18. doi: 10.3390/app152211862.
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Bypassing network activity monitors using process hollowing. In 2025 25th international conference on control systems and computer science : CSCS 2025. - Danvers : IEEE, 2025, p. 237-242. ISBN 979-8-3315-7343-0. ISSN 2379-0482. Dostupné na: https://doi.org/10.1109/CSCS66924.2025.00043 (CSCS 2025 : International conference on control systems and computer science.) Typ: ADMB
    Citations:
    [3.1] HUANG, G.-C. - LAI, T.-H. Legacy code, live risk: Empirical evidence of malware detection gaps. In Applied Sciences. 2025, vol. 15, no. 22, pp. 1-18. doi: 10.3390/app152211862.
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. A theoretical review of mitigation techniques for thick client application vulnerabilities. In IEEE 24th international symposium on computational intelligence and informatics : CINTI 2024. Proceedings. - Danvers : IEEE, 2024, p. 75-80. ISBN 979-8-3503-5343-3. Dostupné na: https://doi.org/10.1109/CINTI63048.2024.10830893 (CINTI 2024 : IEEE 24th international symposium on computational intelligence and informatics.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Withelisting defeat through arbitrary C-sharp code execution. In 2025 7th international conference on computer communication and the internet : ICCCI 2025. Proceedings. - Danvers : IEEE, 2025, p. 168-172. ISBN 979-8-3315-1158-6. ISSN 2833-2350. Dostupné na: https://doi.org/10.1109/ICCCI65070.2025.11158506 (ICCCI 2025 : 2025 7th international conference on computer communication and the internet.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Process injection and migration techniques : * strategies to bypass security software of network communication after a successful reverse shell. In IEEE 23rd world symposium on applied machine intelligence and informatics : SAMI 2025. Proceedings. - Danvers : IEEE, 2025, p. 17-22. ISBN 979-8-3503-7936-5. ISSN 2767-9438. Dostupné na: https://doi.org/10.1109/SAMI63904.2025.10883319 (SAMI 2025 : IEEE 23rd world symposium on applied machine intelligence and informatics.) Typ: ADMB
    Citations:
    [1.1] BRIZENDINE, Bramwell - KUSUMA, Shiva Shashank - RIMAL, Bhaskar P. Process Injection Using Return-Oriented Programming. In IEEE ACCESS, 2025, vol. 13, no., pp. 133790-133816. ISSN 2169-3536. Dostupné na: https://doi.org/10.1109/ACCESS.2025.3592128, Registrované v: WOS
    [3.1] HUANG, G.-C. - LAI, T.-H. Legacy code, live risk: Empirical evidence of malware detection gaps. In Applied Sciences. 2025, vol. 15, no. 22, pp. 1-18. doi: 10.3390/app152211862.
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. PowerShell proxy-aware intercommunication and manipulation. In 13th international symposium on digital forensics and security : ISDFS '25. - Danvers : IEEE, 2025, p. 1-5. ISBN 979-8-3315-0993-4. Dostupné na: https://doi.org/10.1109/ISDFS65363.2025.11012000 (ISDFS '25 : International symposium on digital forensics and security.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Security review of a client-side code execution with HTML smuggling attack. In IEEE 12th international conference on computational cybernetics and cyber-medical systems : ICCC 2025. Proceedings. - Danvers : IEEE, 2025, p. 131-136. ISBN 979-8-3315-0246-1. Dostupné na: https://doi.org/10.1109/ICCC64928.2025.10999118 (ICCC 2025 : IEEE 12th international conference on computational cybernetics and cyber-medical systems.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Attacks on active directory - resource-based constrained delegation and new patches. In 2025 Cybernetics & Informatics (K&I) : 32nd International Conference. - Danvers, US : IEEE, 2025, p. 13-18. ISBN 979-8-3315-4181-1. ISSN 2767-875X. Dostupné na: https://doi.org/10.1109/KI64036.2025.10916465 (2025 Cybernetics & Informatics (K&I) : 32nd International Conference.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Locating and removing signatures from malicious files for antivirus evasion attempt. In 2025 IEEE 8th international conference on computer and communication engineering technology (CCET 2025). - Danvers : IEEE, 2025, p. 66-71. ISBN 979-8-3315-5810-9. Dostupné na: https://doi.org/10.1109/CCET66260.2025.11199370 (2025 IEEE 8th international conference on computer and communication engineering technology : CCET 2025.) Typ: ADMB