中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [2]
信息安全国家重点实验... [2]
作者
Content Type
会议论文 [2]
期刊论文 [2]
Issued Date
Language
英语 [4]
Source
ieee trans... [1]
lecture no... [1]
proceeding... [1]
security a... [1]
Project
Indexed
EI [4]
SCI [2]
CPCI(ISTP) [1]
Spnsorship
afosrfa955... [1]
applied co... [1]
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-4 of 4)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Defending return-oriented programming based on virtualization techniques
[期刊论文]
Security and Communication Networks, 2013-10-01, 卷号: Volume 6, 期号: Issue 10, 页码: 1236-1249
Xiaoqi Jia
;
Rui Wang
;
Jun Jiang
;
Shengzhi Zhang
;
Peng Liu
  |  
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
[会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang
;
Xiaoqi Jia
;
Dengguo Feng
;
Shengzhi Zhang
;
Peng Liu
  |  
peda: comprehensive damage assessment for production environment server systems
[期刊论文]
IEEE Transactions on Information Forensics and Security, 2011-01-01, 卷号: 6, 期号: 4, 页码: 1323-1334
Zhang Shengzhi
;
Jia Xiaoqi
;
Liu Peng
;
Jing Jiwu
cross-layer comprehensive intrusion harm analysis for production workload server systems
[会议论文]
26th Annual Computer Security Applications Conference, ACSAC 2010, Austin, TX, United states, 40883
Zhang Shengzhi
;
Jia Xiaoqi
;
Liu Peng
;
Jing Jiwu
  |  
1
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace