中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-6 of 6)

Items/Page:    Sort:
Defending return-oriented programming based on virtualization techniques [期刊论文]
Security and Communication Networks, 2013-10-01, 卷号: Volume 6, 期号: Issue 10, 页码: 1236-1249
Xiaoqi Jia; Rui Wang; Jun Jiang; Shengzhi Zhang; Peng Liu
  |  
 
fpga-based trusted platform module attack [期刊论文]
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2013-01-01, 卷号: 39, 期号: 1, 页码: 70-75
Li Jian-Jun; Fang Juan; Ji Qi; Liu Peng; Mao Jun-Jie; Lin Li; Jiang Wei

 
multi-objective optimization integration of query interfaces for the deep web based on attribute constraints [期刊论文]
Data and Knowledge Engineering, 2013-01-01, 卷号: 86, 页码: -
Li Yanni; Wang Yuping; Jiang Peng; Zhang Zhensong

 
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming [会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang; Xiaoqi Jia; Dengguo Feng; Shengzhi Zhang; Peng Liu
  |  
 
a network flow approach to the minimum common integer partition problem [期刊论文]
THEORETICAL COMPUTER SCIENCE, 2006-01-01, 卷号: 369, 期号: 1-3, 页码: 456-462
Zhao Wenbo; Zhang Peng; Jiang Tao
  |  
 
a network flow approach to the minimum common integer partition problem [期刊论文]
THEORETICAL COMPUTER SCIENCE, 2006-01-01, 卷号: 369, 期号: 1-3, 页码: 456-462
Zhao Wenbo; Zhang Peng; Jiang Tao
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace