×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [9]
西安交通大学 [1]
华南理工大学 [1]
内容类型
会议论文 [8]
期刊论文 [2]
会议 [1]
发表日期
2017 [1]
2013 [2]
2012 [1]
2011 [1]
2009 [2]
2008 [1]
更多...
学科主题
Computer S... [1]
计算机科学技术基础学... [1]
计算机系统结构::计... [1]
计算机软件::操作系... [1]
计算机软件::程序设... [1]
计算机软件::编译系... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Capability-Based Security Enforcement in Named Data Networking
期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 卷号: 25, 页码: 2719-2730
作者:
Li, Qi
;
Lee, Patrick P. C.
;
Zhang, Peng
;
Su, Purui
;
He, Liang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
capability
Security
named data networking
bind your phone number with caution: automated user profiling through address book matching on smartphone
会议论文
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao
;
Ying Lingyun
;
Jiao Sibei
;
Su Purui
;
Feng Dengguo
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2013/09/22
Data privacy
Signal encoding
Smartphones
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
会议论文
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2013/12/02
Sandbox
Hypervisor based security
Hardware assisted virtualization
Cloud computing
black-box testing based on colorful taint analysis
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 1, 页码: 171-183
Chen Kai
;
Feng DengGuo
;
Su PuRui
;
Zhang YingJun
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2013/09/17
software testing
vulnerability detection
dynamic testing
black-box testing
colorful taint analysis
depsim: a dependency-based malware similarity comparison system
会议论文
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2011/10/10
Behavioral research
Computer crime
Cryptography
Dynamic analysis
Network security
Program processors
Semantics
reconstructing a packed dll binary for static analysis
会议论文
5th International Conference on Information Security Practice and Experience, ISPEC 2009, Xian, China, April 13,
Wang Xianggen
;
Feng Dengguo
;
Su Purui
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2011/03/20
Computer crime
Embedded systems
Security of data
Security systems
Static analysis
reconbin: reconstructing binary file from execution for software analysis
会议论文
3rd International Conference on Secure Software Integration and Reliability Improvement, Shanghai, PEOPLES R CHINA, JUL 08-10,
Ying Lingyun
;
Su Purui
;
Feng Dengguo
;
Wang Xianggen
;
Yang Yi
;
Liu Yu
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2011/03/20
execution monitoring
software security
analysis
malware analysis
binary analysis
exploring malware behaviors based on environment constitution
会议论文
International Conference on Computational-Intelligence and Security, Suzhou, PEOPLES R CHINA, DEC 13-17,
Su Purui
;
Ying Lingyun
;
Feng Dengguo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/06/13
Malware Analysis
Computing Environment Constitution
the design of an artificial immune system
会议论文
the design of an artificial immune system, Beijing CONF, 2006
Purui Su
;
Dengguo Feng
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2011/07/28
the design of an artificial immune system
会议论文
the design of an artificial immune system, Beijing CONF, 2006
Purui Su
;
Dengguo Feng
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2011/07/28
©版权所有 ©2017 CSpace - Powered by
CSpace