×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
江苏大学 [5]
内容类型
会议论文 [4]
期刊论文 [1]
发表日期
2018 [2]
2017 [3]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共5条,第1-5条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
期刊论文
CHINA COMMUNICATIONS, 2018, 卷号: 15, 期号: 2,SI, 页码: 190-208
作者:
Li, Jin[1]
;
Chen, Jinfu[2]
;
Huang, Minhuan[3]
;
Zhou, Minmin[4]
;
Xie, Wanggen[5]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/24
software vulnerability detection
loopholes
information security
evaluation method
testing framework
Vulnerability based on Component Binary Code For Third-Party Component
会议论文
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018-01-01
作者:
Xie, Wanggen[1]
;
Hu, Jinchang[2]
;
Kudjo, Patrick Kwaku[3]
;
Yu, Lei[4]
;
Zeng, Zhifeng[5]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/24
COM component
security testing
buffer overflow
detection of binary codes
A New Method to Construct the Software Vulnerability Model
会议论文
2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017-01-01
作者:
Li, Xiang[1]
;
Chen, Jinfu[2]
;
Lin, Zhechao[3]
;
Zhang, Lin[4]
;
Wang, Zibin[5]
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/24
computer security
vulnerability
vulnerability analysis
vulnerability model
chemical abstract machine
An Integration Testing Platform for Software Vulnerability Detection Method
会议论文
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017-01-01
作者:
Li, Jin[1]
;
Chen, Jinfu[2]
;
Huang, Minhuan[3]
;
Zhou, Minmin[4]
;
Zhang, Lin[5]
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/24
Software vulnerability detection
Loopholes
Information security
Evaluation method
Test platform
A Mining Approach to Obtain the Software Vulnerability Characteristics
会议论文
2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017-01-01
作者:
Li, Xiang[1]
;
Chen, Jinfu[2]
;
Lin, Zhechao[3]
;
Zhang, Lin[4]
;
Wang, Zibin[5]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
Information security
Data mining
Extraction algorithm
Essential characteristics
Software vulnerability
©版权所有 ©2017 CSpace - Powered by
CSpace