根据储存在 Pure 的刊物以及来自 Scopus 的引用文献数量计算
1997 …2025

每年的科研成果

过滤
会议稿件

搜索结果

  • 2020

    LAFuzz: Neural Network for Efficient Fuzzing

    Wang, X., Hu, C., Ma, R., Li, B. & Wang, X., 11月 2020, Proceedings - IEEE 32nd International Conference on Tools with Artificial Intelligence, ICTAI 2020. Alamaniotis, M. & Pan, S. (编辑). IEEE Computer Society, 页码 603-611 9 页码 9288180. (Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI; 卷 2020-November).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    7 引用 (Scopus)
  • Research on Software Network Key Nodes Mining Methods Based on Complex Network

    Shan, C., Wang, P., Hu, C., Gao, X. & Mei, S., 2020, Trusted Computing and Information Security - 13th Chinese Conference, CTCIS 2019, Revised Selected Papers. Han, W., Zhu, L. & Yan, F. (编辑). Springer, 页码 193-205 13 页码 (Communications in Computer and Information Science; 卷 1149 CCIS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • 2019

    An Improved Prediction Model for the Network Security Situation

    Hu, J., Ma, D., Chen, L., Yan, H. & Hu, C., 2019, Smart Computing and Communication - 4th International Conference, SmartCom 2019, Proceedings. Qiu, M. (编辑). Springer, 页码 22-33 12 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 11910 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • A vulnerability detection model for java systems based on complex networks

    Xiong, L., Chun, S., Hu, C., Yu, Z. & Xiong, W., 8月 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., 页码 1339-1347 9 页码 9060132. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • Detecting malicious urls using a deep learning approach based on stacked denoising autoencoder

    Yan, H., Zhang, X., Xie, J. & Hu, C., 2019, Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Revised Selected Papers. Zhang, H., Zhao, B. & Yan, F. (编辑). Springer Verlag, 页码 372-388 17 页码 (Communications in Computer and Information Science; 卷 960).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    4 引用 (Scopus)
  • Network risk assessment method based on asset correlation graph

    Shan, C., Gao, J., Hu, C., Guan, F. & Zhao, X., 2019, Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Revised Selected Papers. Zhang, H., Zhao, B. & Yan, F. (编辑). Springer Verlag, 页码 65-83 19 页码 (Communications in Computer and Information Science; 卷 960).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    4 引用 (Scopus)
  • Segmental symbolic execution based on clustering

    Ma, R., Gao, H., Dou, B., Wang, X. & Hu, C., 8月 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., 页码 1289-1296 8 页码 9060117. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • 2018

    A double-layer detection and classification approach for network attacks

    Sun, C., Lv, K., Hu, C. & Xie, H., 9 10月 2018, ICCCN 2018 - 27th International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., 8487460. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; 卷 2018-July).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    12 引用 (Scopus)
  • A monte carlo graph search algorithm with ant colony optimization for optimal attack path analysis

    Xie, H., Lv, K., Hu, C. & Sun, C., 9 10月 2018, ICCCN 2018 - 27th International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., 8487462. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; 卷 2018-July).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    2 引用 (Scopus)
  • An attack graph generation method based on parallel computing

    Cao, N., Lv, K. & Hu, C., 2018, Science of Cyber Security - 1st International Conference, SciSec 2018, Revised Selected Papers. Liu, F., Yung, M. & Xu, S. (编辑). Springer Verlag, 页码 34-48 15 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 11287 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    7 引用 (Scopus)
  • An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets

    Xie, H., Lv, K. & Hu, C., 5 9月 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., 页码 1777-1784 8 页码 8456136. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    9 引用 (Scopus)
  • An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis

    Xie, H., Lv, K. & Hu, C., 5 9月 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., 页码 307-315 9 页码 8455922. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • A partition matching method for optimal attack path analysis

    Xie, H., Lv, K. & Hu, C., 2 7月 2018, Proceedings - 16th IEEE International Symposium on Parallel and Distributed Processing with Applications, 17th IEEE International Conference on Ubiquitous Computing and Communications, 8th IEEE International Conference on Big Data and Cloud Computing, 11th IEEE International Conference on Social Computing and Networking and 8th IEEE International Conference on Sustainable Computing and Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018. Chen, J. & Yang, L. T. (编辑). Institute of Electrical and Electronics Engineers Inc., 页码 120-126 7 页码 8672220. (Proceedings - 16th IEEE International Symposium on Parallel and Distributed Processing with Applications, 17th IEEE International Conference on Ubiquitous Computing and Communications, 8th IEEE International Conference on Big Data and Cloud Computing, 11th IEEE International Conference on Social Computing and Networking and 8th IEEE International Conference on Sustainable Computing and Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • A secure pairing-free certificate-less authenticated key agreement protocol

    Chun, S., Kangwen, H., Jingfeng, X., Changzhen, H. & Rui, M., 2018, Lecture Notes in Real-Time Intelligent Systems. Mizera-Pietraszko, J. & Pichappan, P. (编辑). Springer Verlag, 页码 205-216 12 页码 (Advances in Intelligent Systems and Computing; 卷 613).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • Establishing an optimal network defense system: A monte carlo graph search method

    Zhang, Z., Lv, K. & Hu, C., 2018, Science of Cyber Security - 1st International Conference, SciSec 2018, Revised Selected Papers. Liu, F., Yung, M. & Xu, S. (编辑). Springer Verlag, 页码 181-190 10 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 11287 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    3 引用 (Scopus)
  • Software System Representation Methods Based on Algebraic Component

    Yu, Z., Shan, C., Mao, L., Hu, C. & Xiong, W., 5 9月 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., 页码 1008-1013 6 页码 8456011. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • 2017

    A detecting method of array bounds defects based on symbolic execution

    Shan, C., Sun, S., Xue, J., Hu, C. & Zhu, H., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (编辑). Springer Verlag, 页码 373-385 13 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10394 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    2 引用 (Scopus)
  • A driver model based on emotion

    Xiao, Q., Hu, C. & Ding, G., 2017, Advances in Swarm Intelligence - 8th International Conference, ICSI 2017, Proceedings. Niu, B., Takagi, H., Shi, Y. & Tan, Y. (编辑). Springer Verlag, 页码 608-614 7 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10386 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • Analysis of vulnerability correlation based on data fitting

    Wang, L., Ma, R., Gao, H. R., Wang, X. J. & Hu, C. Z., 2017, Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings. Yan, F., Xu, M., Fu, S. & Qin, Z. (编辑). Springer Verlag, 页码 165-180 16 页码 (Communications in Computer and Information Science; 卷 704).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • An automatic vulnerabilities classification method based on their relevance

    Zhang, H., Lv, K. & Hu, C., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (编辑). Springer Verlag, 页码 475-485 11 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10394 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    5 引用 (Scopus)
  • An online approach to defeating return-oriented-programming attacks

    Tian, D., Jia, X., Zhan, L., Hu, C. & Xue, J., 2017, Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Proceedings. Wu, W., Castiglione, A. & Wen, S. (编辑). Springer Verlag, 页码 236-247 12 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10581 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    2 引用 (Scopus)
  • A practical method to confine sensitive API invocations on commodity hardware

    Tian, D., Qi, D., Zhan, L., Yin, Y., Hu, C. & Xue, J., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (编辑). Springer Verlag, 页码 145-159 15 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10394 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • A quantitative method for evaluating network security based on attack graph

    Zheng, Y., Lv, K. & Hu, C., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (编辑). Springer Verlag, 页码 349-358 10 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10394 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    8 引用 (Scopus)
  • Defenses against wormhole attacks in wireless sensor networks

    Ma, R., Chen, S., Ma, K., Hu, C. & Wang, X., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (编辑). Springer Verlag, 页码 413-426 14 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10394 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    5 引用 (Scopus)
  • Mining frequent intra-sequence and inter-sequence patterns using bitmap with a maximal span

    Liao, W., Wang, Q., Yang, L., Ren, J., Davis, D. N. & Hu, C., 2 7月 2017, Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017. Institute of Electrical and Electronics Engineers Inc., 页码 56-61 6 页码 (Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017; 卷 2018-January).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    3 引用 (Scopus)
  • Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis

    Liao, W., Wang, Q., Yang, L., Ren, J., Davis, D. N. & Hu, C., 2 7月 2017, Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017. Institute of Electrical and Electronics Engineers Inc., 页码 62-67 6 页码 (Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017; 卷 2018-January).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • Optimal attack path generation based on supervised kohonen neural network

    Chen, Y., Lv, K. & Hu, C., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (编辑). Springer Verlag, 页码 399-412 14 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10394 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    3 引用 (Scopus)
  • Predicting vulnerable software components using software network graph

    Wei, S., Du, X., Hu, C. & Shan, C., 2017, Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Proceedings. Wu, W., Castiglione, A. & Wen, S. (编辑). Springer Verlag, 页码 280-290 11 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10581 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • SulleyEX: A fuzzer for stateful network protocol

    Ma, R., Zhu, T., Hu, C., Shan, C. & Zhao, X., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (编辑). Springer Verlag, 页码 359-372 14 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 10394 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    4 引用 (Scopus)
  • 2016

    Application of complexity and brittleness on software architecture

    Zhang, H., Hu, C. & Wang, X., 7 10月 2016, Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016. Institute of Electrical and Electronics Engineers Inc., 页码 570-573 4 页码 7586587. (Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Dynamic tracking reinforcement based on simplified control flow

    Li, J., Tian, D. & Hu, C., 1 2月 2016, Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015. Institute of Electrical and Electronics Engineers Inc., 页码 358-362 5 页码 7397107. (Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Outlier detection for time-evolving complex networks

    Zhang, H., Hu, C. & Wang, X., 2016, Proceedings of 2015 International Conference on Electrical and Information Technologies for Rail Transportation - Transportation. Qin, Y., Jia, L., Diao, L., Feng, J. & An, M. (编辑). Springer Verlag, 页码 677-684 8 页码 (Lecture Notes in Electrical Engineering; 卷 378).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Software defect prediction model based on improved LLE-SVM

    Shan, C., Zhu, H., Hu, C., Cui, J. & Xue, J., 13 6月 2016, Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015. Institute of Electrical and Electronics Engineers Inc., 页码 530-535 6 页码 7490804. (Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    11 引用 (Scopus)
  • The importance of k-shell in discovering key nodes in complex networks

    Zhang, H., Hu, C. & Wang, X., 7 10月 2016, Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016. Institute of Electrical and Electronics Engineers Inc., 页码 565-569 5 页码 7586586. (Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    2 引用 (Scopus)
  • 2015

    Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs

    Wang, Y., Li, M., Yan, H., Liu, Z., Xue, J. & Hu, C., 2015, Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015. Messina, F., Xhafa, F., Ogiela, M. R. & Barolli, L. (编辑). Institute of Electrical and Electronics Engineers Inc., 页码 430-434 5 页码 7424602. (Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Software behavior model measuring approach of combining structural analysis and language set

    Xue, J., Zhang, Y., Hu, C., Ren, H. & Li, Z., 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (编辑). Springer Verlag, 页码 137-150 14 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 9473).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Taint propagation path analysis based on program dependency

    Wang, Y., Wang, C., Hu, C. Z. & Shan, C., 2015, Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014. Zheng, D. (编辑). CRC Press/Balkema, 页码 159-164 6 页码 (Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • 2014

    A discovery method of the dirty data transmission path based on complex network

    Zhao, X. L., Hao, G., Hu, C. Z. & Li, Z. Q., 2014, Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II. Liu, H. W., Wang, G. & Zhang, G. W. (编辑). Trans Tech Publications Ltd., 页码 1741-1747 7 页码 (Applied Mechanics and Materials; 卷 651-653).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Fuzz testing data generation for network protocol using classification tree

    Ma, R., Ji, W., Hu, C., Shan, C. & Peng, W., 2014, IET Conference Publications. CP653 编辑 Institution of Engineering and Technology, 0748. (IET Conference Publications; 卷 2014, 号码 CP653).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    10 引用 (Scopus)
  • Measurement of software structural properties based on the theory of complex networks

    Zhao, X. L., Chen, X. L. Y., Hu, C. Z., Wang, Y. & Li, Q. J., 2014, Advanced Manufacturing and Information Engineering, Intelligent Instrumentation and Industry Development. Trans Tech Publications Ltd., 页码 2163-2169 7 页码 (Applied Mechanics and Materials; 卷 602-605).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    2 引用 (Scopus)
  • Research on software behavior modeling based on extended finite state automata

    Zhao, X., Xue, J., Hu, C., Ma, R. & Zhang, S., 2014, IET Conference Publications. CP653 编辑 Institution of Engineering and Technology, 0744. (IET Conference Publications; 卷 2014, 号码 CP653).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • Software defect prediction model based on LLE and SVM

    Shan, C., Chen, B., Hu, C., Xue, J. & Li, N., 2014, IET Conference Publications. CP653 编辑 Institution of Engineering and Technology, 0749. (IET Conference Publications; 卷 2014, 号码 CP653).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    23 引用 (Scopus)
  • Software structural stability evaluation method based on motifs

    Shan, C., Huang, L., Hu, C. Z., Zhao, X. L. & Ma, J. S., 2014, Materials Science, Computer and Information Technology. Trans Tech Publications Ltd., 页码 2128-2134 7 页码 (Advanced Materials Research; 卷 989-994).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • 2013

    A dynamic detection method to C/C++ programs memory vulnerabilities based on pointer analysis

    Ma, R., Chen, L., Hu, C., Xue, J. & Zhao, X., 2013, Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013. IEEE Computer Society, 页码 52-57 6 页码 6844337. (Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • An approach for cross-domain access control policy generation from reputation evaluation to trust management

    Wang, Y., Liu, Z. Y., Hu, C. Z., Zhao, X. L., Xue, J. F. & Wei, L. X., 2013, 2013 International Conference on Information and Network Security, ICINS 2013. 643 CP 编辑 Institution of Engineering and Technology, (IET Conference Publications; 卷 2013, 号码 643 CP).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Cyber security datasets research

    Wang, Z., Hu, C., Hao, M. & Lu, F., 2013, Advanced Materials and Computer Science II. 页码 191-195 5 页码 (Advanced Materials Research; 卷 659).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • 2011

    A novel framework for active detection of HTTP based attacks

    Jie, L., Jianwei, S. & Changzhen, H., 2011, Communication Systems and Information Technology - Selected Papers from the 2011 International Conference on Electric and Electronics, EEIC 2011. VOL. 4 编辑 页码 411-418 8 页码 (Lecture Notes in Electrical Engineering; 卷 100 LNEE, 号码 VOL. 4).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

  • Integrating offline analysis and online protection to defeat buffer overflow attacks

    Tian, D., Xiong, X., Hu, C. & Liu, P., 2011, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Springer Verlag, 页码 409-415 7 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 6531 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • Memory errors prevention technology for C/C++ program based on probability

    Xue, J., Hu, C., Ren, H., Ma, R. & Li, J., 2011, NLP-KE 2011 - Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering. 页码 233-237 5 页码 6138200. (NLP-KE 2011 - Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    1 引用 (Scopus)
  • Policy-centric protection of OS kernel from vulnerable loadable kernel modules

    Tian, D., Xiong, X., Hu, C. & Liu, P., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. 页码 317-332 16 页码 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 6672 LNCS).

    科研成果: 书/报告/会议事项章节会议稿件同行评审

    2 引用 (Scopus)