中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-8 of 8)

Filters    
Items/Page:    Sort:
Direct Resource Hijacking in Android [期刊论文]
IEEE INTERNET COMPUTING, 2016-01-01, 卷号: 20, 期号: 5, 页码: 46-56
Gu, YC; Li, Q; Zhang, HT; Su, PR; Zhang, XW; Feng, DG

 
bind your phone number with caution: automated user profiling through address book matching on smartphone [会议论文]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao; Ying Lingyun; Jiao Sibei; Su Purui; Feng Dengguo

 
extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers [会议论文]
10th International Conference on Applied Cryptography and Network Security, ACNS 2012, Singapore, Singapore, June 26, 2012 - June 29, 2012
Zhang Wentao; Su Bozhan; Wu Wenling; Feng Dengguo; Wu Chuankun

 
black-box testing based on colorful taint analysis [期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2012-01-01, 卷号: 55, 期号: 1, 页码: 171-183
Chen Kai; Feng DengGuo; Su PuRui; Zhang YingJun

 
a packet marking scheme for ip traceback [会议论文]
4th International Conference on Networking (ICN 2005), Reunion Isl, FRANCE, APR 17-21,
Qu HP; Su PR; Lin DD; Feng DG
  |  
 
detecting the deviations of privileged process execution [会议论文]
4th International Conference on Networking (ICN 2005), Reunion Isl, FRANCE, APR 17-21,
Su PR; Li DQ; Qu HP; Feng DG
  |  
 
blocking msn: a case study of preventing the abuse of im [会议论文]
11th Asia-Pacific Conference on Communications, Perth, AUSTRALIA, OCT 03-05,
Hu ZY; Liu ZQ; Su PR; Feng DG
  |  
 
a typical noisy covert channel in the ip protocol [会议论文]
38th Annual International Carnahan Conference on Security Technology, Albuquerque, NM, OCT 11-14,
Qu HP; Su PR; Feng DG
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace