CORC

浏览/检索结果: 共11条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Capability-Based Security Enforcement in Named Data Networking 期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 卷号: 25, 页码: 2719-2730
作者:  Li, Qi;  Lee, Patrick P. C.;  Zhang, Peng;  Su, Purui;  He, Liang
收藏  |  浏览/下载:4/0  |  提交时间:2019/11/26
bind your phone number with caution: automated user profiling through address book matching on smartphone 会议论文
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao; Ying Lingyun; Jiao Sibei; Su Purui; Feng Dengguo
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing 会议论文
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang; Meining Nie; Purui Su; Dengguo Feng
收藏  |  浏览/下载:17/0  |  提交时间:2013/12/02
black-box testing based on colorful taint analysis 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 1, 页码: 171-183
Chen Kai; Feng DengGuo; Su PuRui; Zhang YingJun
收藏  |  浏览/下载:17/0  |  提交时间:2013/09/17
depsim: a dependency-based malware similarity comparison system 会议论文
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
收藏  |  浏览/下载:20/0  |  提交时间:2011/10/10
reconstructing a packed dll binary for static analysis 会议论文
5th International Conference on Information Security Practice and Experience, ISPEC 2009, Xian, China, April 13,
Wang Xianggen; Feng Dengguo; Su Purui
收藏  |  浏览/下载:9/0  |  提交时间:2011/03/20
reconbin: reconstructing binary file from execution for software analysis 会议论文
3rd International Conference on Secure Software Integration and Reliability Improvement, Shanghai, PEOPLES R CHINA, JUL 08-10,
Ying Lingyun; Su Purui; Feng Dengguo; Wang Xianggen; Yang Yi; Liu Yu
收藏  |  浏览/下载:17/0  |  提交时间:2011/03/20
exploring malware behaviors based on environment constitution 会议论文
International Conference on Computational-Intelligence and Security, Suzhou, PEOPLES R CHINA, DEC 13-17,
Su Purui; Ying Lingyun; Feng Dengguo
收藏  |  浏览/下载:10/0  |  提交时间:2011/06/13
the design of an artificial immune system 会议论文
the design of an artificial immune system, Beijing CONF, 2006
Purui Su; Dengguo Feng
收藏  |  浏览/下载:9/0  |  提交时间:2011/07/28
the design of an artificial immune system 会议论文
the design of an artificial immune system, Beijing CONF, 2006
Purui Su; Dengguo Feng
收藏  |  浏览/下载:8/0  |  提交时间:2011/07/28


©版权所有 ©2017 CSpace - Powered by CSpace