Logo - springer
Slogan - springer

Computer Science | Journal in Computer Virology and Hacking Techniques - incl. option to publish open access

We’re working on a new version of this journal site - preview it now
Journal of Computer Virology and Hacking Techniques

Journal of Computer Virology and Hacking Techniques

Editor-in-Chief: Eric Filiol

ISSN: 2263-8733 (electronic version)

Journal no. 11416

80,33 € Personal Rate e-only
Get Subscription

Online subscription, valid from January through December of current calendar year

Immediate access to this year's issues via SpringerLink

Volume(-s) with issue(-s) per annual subscription

Automatic annual renewal

More information: >> FAQs // >> Policy

  • Examines viral and antiviral computer technologies
  • Encompasses both theoretical and experimental aspects of the topic
  • Dedicated to proactive defense

The Journal of Computer Virology and Hacking Techniques is an independent academic and technical journal dedicated to viral and antiviral computer technologies and hacking techniques (software and hardware). It considers both the theoretical and experimental aspects of computer virology and of the different techniques and approaches used by hackers.
The topics covered by this journal include but are not limited to the mathematical aspects and theoretical fundamentals of computer virology; algorithmics and computer virology; computer immunology and biological models for computers; reverse engineering (hardware and software); viral and antiviral technologies; cryptology and steganography tools and techniques; applications in computer virology; virology and IDS; hardware hacking, and free and open hardware; operating system, network, and embedded systems security; and social engineering.

While the academic world focuses on scientific methodologies (conciseness, precision and rigor of the scientific method), the hacking world approach focuses primarily on achieving goals and therefore favors the results over the methods, often producing outstanding results with new, innovative and sometimes unorthodox methods.

The goal of the journal is to enable a harmonious synthesis between both worlds and promote constructive research in computer virology and hacking techniques by publishing technical and scientific results, the ultimate objective being proactive research on attacks, through malware or not, and a proactive defense against them. 

This journal was previously known as Journal in Computer Virology.

Related subjects » Computer Science

Abstracted/Indexed in 

SCOPUS, INSPEC, Google Scholar, ACM, ACM Digital Library, DBLP, EBSCO Discovery Service, EI Compendex, Emerging Sources Citation Index, Gale, Gale Academic OneFile, Institute of Scientific and Technical Information of China, Japanese Science and Technology Agency (JST), Naver, OCLC WorldCat Discovery Service, ProQuest Advanced Technologies & Aerospace Database, ProQuest Central, ProQuest SciTech Premium Collection, ProQuest Technology Collection, ProQuest-ExLibris Primo, ProQuest-ExLibris Summon

Subscription information 

2019. Volume 15 (4 issues each). 80,33 € suggested net price* plus shipping charges. If an online version exists, subscription includes both the print edition and online access via SpringerLink (Basic SpringerLink License).

Read this Journal on Springerlink

For authors and editors

  • Aims and Scope

    Aims and Scope


    The field of computer virus prevention has rapidly taken an important position in our technological and information society. Viral attacks increase year after year, and antiviral efforts continually face new challenges. Beneficial applications of technologies based on scientific computer virology are still very limited. The theoretical aspects of the virus problem are only rarely considered, although many interesting and important open problems still exist. Little proactive research is focused on predicting the future of viral attacks.

    The Journal of Computer Virology and Hacking Techniques is an independent scientific and technical journal dedicated to viral and antiviral computer technologies. Both theoretical and experimental aspects will be considered; papers emphasizing the theoretical aspects are especially welcome. The topics covered by this journal include, but are certainly not limited to:

    - Mathematical aspects and theoretical fundamentals of computer virology
    - Algorithmics and computer virology
    - Computer immunology and biological models for computers
    - Reverse engineering (hardware and software)
    - Viral  and antiviral technologies
    - Cryptology and steganography tools and techniques
    - Applications in computer virology
    - Virology and IDS
    - Hardware hacking, and free and open hardware
    - Operating system, network, and embedded systems security
    - Social engineering

    In addition, since computational problems are of practical interest, papers on the computational aspects of computer virology are welcome. It is expected that the areas covered by this journal will change as new technologies, methodologies, challenges and applications develop.

    Hacking involves understanding technology intimately and in depth in order to use it in an operational way. Hackers are complementary to academics in that they favour the result over the methods and over the theory, while academics favour the formalization and the methods -- explaining is not operating and operating is not explaining. The aim of the journal in this respect is to build a bridge between the two communities for the benefit of technology and science.

    The aim of the Journal of Computer Virology and Hacking Techniques is to promote constructive research in computer virology by publishing technical and scientific results related to this research area. Submitted papers will be judged primarily by their content, their originality and their technical and scientific quality. Contributions should comprise novel and previously unpublished material.

    However, prior publication in conference proceedings of an abstract, summary, or other abbreviated, preliminary form of the material should not preclude publication in this journal when notice of such prior or concurrent publication is given with the submission. In addition to full-length theoretical and technical articles, short communications or notes are acceptable. Survey papers will be accepted with a prior invitation only. Special issues devoted to a single topic are also planned.

    The policy of the journal is to maintain strict refereeing procedures, to perform a high quality peer-review of each submitted paper, and to send notification to the author(s) with as short a delay as possible. Accepted papers will normally be published within one year of submission at the latest. The journal will be published four times a year.

    Note: As far as new viral techniques are concerned, the journal strongly encourages authors to consider algorithmic aspects rather than the actual source code of a particular virus. Nonetheless, papers containing viral source codes may be accepted provided that a scientific approach is maintained and that inclusion of the source code is necessary for the presentation of the research. No paper containing a viral source code will be considered or accepted unless the complete source code is communicated to the Editor-in-Chief. No publication will occur before antiviral companies receive this source code to update/upgrade their products.

    The final objective is, once again, proactive defence.

    This journal was previously known as Journal in Computer Virology. It is published by Springer France.

  • Submit Online
  • Open Choice - Your Way to Open Access
  • Write & Submit: Overleaf LaTeX Template
  • CFP: Russian Research in Cryptology and ...
  • Instructions for Authors

    Instructions for Authors


  • Author Academy: Training for Authors
  • English Language Editing

    English Language Editing


  • Copyright Information

    Copyright Information


    Copyright Information

    For Authors

    Submission of a manuscript implies: that the work described has not been published before (except in form of an abstract or as part of a published lecture, review or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all co-authors, if any, as well as – tacitly or explicitly – by the responsible authorities at the institution where the work was carried out.

    Author warrants (i) that he/she is the sole owner or has been authorized by any additional copyright owner to assign the right, (ii) that the article does not infringe any third party rights and no license from or payments to a third party is required to publish the article and (iii) that the article has not been previously published or licensed. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. Transfer of copyright to Springer (respective to owner if other than Springer) becomes effective if and when a Copyright Transfer Statement is signed or transferred electronically by the corresponding author. After submission of the Copyright Transfer Statement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted by Springer.

    The copyright to this article, including any graphic elements therein (e.g. illustrations, charts, moving images), is assigned for good and valuable consideration to Springer effective if and when the article is accepted for publication and to the extent assignable if assignability is restricted for by applicable law or regulations (e.g. for U.S. government or crown employees).

    The copyright assignment includes without limitation the exclusive, assignable and sublicensable right, unlimited in time and territory, to reproduce, publish, distribute, transmit, make available and store the article, including abstracts thereof, in all forms of media of expression now known or developed in the future, including pre- and reprints, translations, photographic reproductions and microform. Springer may use the article in whole or in part in electronic form, such as use in databases or data networks for display, print or download to stationary or portable devices. This includes interactive and multimedia use and the right to alter the article to the extent necessary for such use.

    Authors may self-archive the Author's accepted manuscript of their articles on their own websites. Authors may also deposit this version of the article in any repository, provided it is only made publicly available 12 months after official publication or later. He/she may not use the publisher's version (the final article), which is posted on SpringerLink and other Springer websites, for the purpose of self-archiving or deposit. Furthermore, the Author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".

    Prior versions of the article published on non-commercial pre-print servers like arXiv.org can remain on these servers and/or can be updated with Author's accepted version. The final published version (in pdf or html/xml format) cannot be used for this purpose. Acknowledgement needs to be given to the final publication and a link must be inserted to the published article on Springer's website, accompanied by the text "The final publication is available at link.springer.com". Author retains the right to use his/her article for his/her further scientific career by including the final published journal article in other publications such as dissertations and postdoctoral qualifications provided acknowledgement is given to the original source of publication.

    Author is requested to use the appropriate DOI for the article. Articles disseminated via link.springer.com are indexed, abstracted and referenced by many abstracting and information services, bibliographic networks, subscription agencies, library networks, and consortia.

    For Readers

    While the advice and information in this journal is believed to be true and accurate at the date of its publication, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may have been made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

    All articles published in this journal are protected by copyright, which covers the exclusive rights to reproduce and distribute the article (e.g., as offprints), as well as all translation rights. No material published in this journal may be reproduced photographically or stored on microfilm, in electronic data bases, video disks, etc., without first obtaining written permission from the publisher (respective the copyright owner if other than Springer). The use of general descriptive names, trade names, trademarks, etc., in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

    Springer has partnered with Copyright Clearance Center's RightsLink service to offer a variety of options for reusing Springer content. For permission to reuse our content please locate the material that you wish to use on link.springer.com or on springerimages.com and click on the permissions link or go to copyright.com, then enter the title of the publication that you wish to use. For assistance in placing a permission request, Copyright Clearance Center can be connected directly via phone: +1-855-239-3415, fax: +1-978-646-8600, or e-mail: info@copyright.com.

    © Springer-Verlag France

Alerts for this journal


Get the table of contents of every new issue published in Journal of Computer Virology and Hacking Techniques.