中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
信息安全国家重点实... [11]
软件所图书馆 [8]
互联网软件技术实验室... [2]
作者
Content Type
会议论文 [17]
期刊论文 [4]
Issued Date
2016 [1]
Language
英语 [12]
中文 [1]
Source
lecture no... [6]
lecture no... [2]
proceeding... [2]
ruan jian ... [2]
asia ccs 2... [1]
更多...
Project
Indexed
EI [7]
ISTP [4]
SCI [4]
其他 [3]
IEEE [2]
更多...
Spnsorship
state key ... [2]
acm sigsac... [1]
adnovum [1]
chinese ac... [1]
ieee [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 21)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Direct Resource Hijacking in Android
[期刊论文]
IEEE INTERNET COMPUTING, 2016-01-01, 卷号: 20, 期号: 5, 页码: 46-56
Gu, YC
;
Li, Q
;
Zhang, HT
;
Su, PR
;
Zhang, XW
;
Feng, DG
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
[会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
  |  
bind your phone number with caution: automated user profiling through address book matching on smartphone
[会议论文]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao
;
Ying Lingyun
;
Jiao Sibei
;
Su Purui
;
Feng Dengguo
extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
[会议论文]
10th International Conference on Applied Cryptography and Network Security, ACNS 2012, Singapore, Singapore, June 26, 2012 - June 29, 2012
Zhang Wentao
;
Su Bozhan
;
Wu Wenling
;
Feng Dengguo
;
Wu Chuankun
black-box testing based on colorful taint analysis
[期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2012-01-01, 卷号: 55, 期号: 1, 页码: 171-183
Chen Kai
;
Feng DengGuo
;
Su PuRui
;
Zhang YingJun
depsim: a dependency-based malware similarity comparison system
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
  |  
hyper-sbox view of aes-like permutations: a generalized distinguisher
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
;
Su Bozhan
  |  
stochastic process algebra based software process simulation modeling
[会议论文]
International Conference on Software Process, Vancouver, BC, Canada, 2009-5-16
Jian Zhai
;
Qiusong Yang
;
Feng Su
;
Junchao Xiao
;
Qing Wang
;
Li Mingshu
reconstructing a packed dll binary for static analysis
[会议论文]
5th International Conference on Information Security Practice and Experience, ISPEC 2009, Xian, China, April 13,
Wang Xianggen
;
Feng Dengguo
;
Su Purui
some new observations on the sms4 block cipher in the chinese wapi standard
[会议论文]
5th International Conference on Information Security Practice and Experience, Xi an, PEOPLES R CHINA, APR 13-15,
Zhang Wentao
;
Wu Wenling
;
Feng Dengguo
;
Su Bozhan
1
2
3
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace