中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 26)

Items/Page:    Sort:
Statically-directed dynamic taint analysis [期刊论文]
Chinese Journal of Electronics, 2014-01-01, 卷号: 23, 期号: 1, 页码: 18-24
Chen, Kai (1); Zhang, Yingjun (2)

 
基于时空维度分析的网络安全态势预测方法 [期刊论文]
计算机研究与发展, 2014-01-01, 卷号: 51, 期号: 8, 页码: 1681-1694
刘玉岭; 冯登国; 连一峰; 陈恺; 吴迪

 
基于神经网络的DDoS防护绩效评估 [期刊论文]
计算机研究与发展, 2013-01-01, 卷号: 50, 期号: 10, 页码: 2100-2108
黄亮; 冯登国; 连一峰; 陈恺

 
Optimal defense strategies for DDoS defender using Bayesian game model [会议论文]
9th International Conference on Information Security Practice and Experience, ISPEC 2013, Lanzhou, China, May 12, 2013 - May 14, 2013
Liu, Yuling (1); Feng, Dengguo (1); Lian, Yifeng (1); Chen, Kai (2); Zhang, Yingjun (1)

 
research on monitor position in network situation assessment [会议论文]
2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012, Xi'an, China, August 23, 2012 - August 25, 2012
Qin Yi; Feng Deng Guo; Chen Kai; Lian Yi Feng

 
virtualization detection based on data fusion [会议论文]
2012 International Conference on Computer Science and Information Processing, CSIP 2012, Xi'an, Shaanxi, China, August 24, 2012 - August 26, 2012
Wang Jia-Bin; Lian Yi-Feng; Chen Kai

 
towards dynamic random testing for web services [会议论文]
36th IEEE Annual International Computer Software and Applications Conference, COMPSAC 2012, Izmir, Turkey, July 16, 2012 - July 20, 2012
Sun Chang-Ai; Wang Guan; Cai Kai-Yuan; Chen Tsong Yueh

 
distribution-aware mutation analysis [会议论文]
36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012, Izmir, Turkey, July 16, 2012 - July 20, 2012
Sun Chang-Ai; Wang Guan; Cai Kai-Yuan; Chen Tsong Yueh

 
a path-based access control method for location obfuscation in mobile environment [会议论文]
2012 IEEE Symposium on Electrical and Electronics Engineering, EEESYM 2012, Kuala Lumpur, Malaysia, June 24, 2012 - June 27, 2012
Zhang Yingjun; Chen Kai; Lian Yifeng

 
autodunt: dynamic latent dependence analysis for detection of zero day vulnerability [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Chen Kai; Lian Yifeng; Zhang Yingjun

 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace