中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
信息安全国家重点实... [89]
作者
王雅哲 [2]
Content Type
期刊论文 [54]
会议论文 [35]
Issued Date
Language
中文 [31]
英语 [9]
Source
lecture n... [19]
软件学报 [7]
计算机研究与发展 [6]
中国科学院研究生院学... [5]
计算机学报 [5]
更多...
Project
descriptio... [1]
Indexed
EI [24]
SCI [10]
EI,WANFANG... [3]
CPCI(ISTP) [2]
CSCD,WANFA... [2]
更多...
Spnsorship
acm sigsac [1]
acm spec. ... [1]
bcqre, chu... [1]
chinese ac... [1]
chinese ac... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 89)
Filters
Community:信息安全国家重点实验室
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Defending return-oriented programming based on virtualization techniques
[期刊论文]
Security and Communication Networks, 2013-10-01, 卷号: Volume 6, 期号: Issue 10, 页码: 1236-1249
Xiaoqi Jia
;
Rui Wang
;
Jun Jiang
;
Shengzhi Zhang
;
Peng Liu
  |  
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
[会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
  |  
基于有限约束满足问题的溢出漏洞动态检测方法
[期刊论文]
计算机学报, 2012-01-01, 卷号: 35, 期号: 5, 页码: 898-909
陈恺
;
冯登国
;
苏璞睿
  |  
一种给定脆弱性环境下的安全措施效用评估模型
[期刊论文]
软件学报, 2012-01-01, 卷号: 23, 期号: 7, 页码: 1880-1898
吴迪
;
冯登国
;
连一峰
;
陈恺
  |  
一种基于分组自适应的网络环境快速构建方法
[期刊论文]
中国科学院研究生院学报, 2012-01-01, 卷号: 29, 期号: 4, 页码: 536-542
王佳宾
;
连一峰
;
陈恺
  |  
一种无证书的家庭基站认证方案
[期刊论文]
中国科学院研究生院学报, 2012-01-01, 卷号: 29, 期号: 1, 页码: 141-144
谢涛
;
武传坤
  |  
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
[会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang
;
Xiaoqi Jia
;
Dengguo Feng
;
Shengzhi Zhang
;
Peng Liu
  |  
depsim: a dependency-based malware similarity comparison system
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
  |  
bcbc: a more efficient mac algorithm
[会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liang Bo
;
Wu Wenling
;
Zhang Liting
  |  
collusion attack on a self-healing key distribution with revocation in wireless sensor networks
[会议论文]
11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, August 24,
Bao Kehua
;
Zhang Zhenfeng
  |  
1
2
3
4
5
6
7
8
9
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace