中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [9]
采集方式
OAI收割 [9]
内容类型
会议论文 [8]
期刊论文 [1]
发表日期
2013 [2]
2012 [1]
2011 [1]
2009 [2]
2008 [1]
2006 [2]
更多
学科主题
Computer S... [1]
计算机科学技术基础学... [1]
计算机系统结构::计... [1]
计算机软件::操作系... [1]
计算机软件::程序设... [1]
计算机软件::编译系... [1]
更多
筛选
浏览/检索结果:
共9条,第1-9条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
bind your phone number with caution: automated user profiling through address book matching on smartphone
会议论文
OAI收割
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao
;
Ying Lingyun
;
Jiao Sibei
;
Su Purui
;
Feng Dengguo
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2013/09/22
Data privacy
Signal encoding
Smartphones
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
会议论文
OAI收割
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2013/12/02
Sandbox
Hypervisor based security
Hardware assisted virtualization
Cloud computing
black-box testing based on colorful taint analysis
期刊论文
OAI收割
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 1, 页码: 171-183
Chen Kai
;
Feng DengGuo
;
Su PuRui
;
Zhang YingJun
  |  
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2013/09/17
software testing
vulnerability detection
dynamic testing
black-box testing
colorful taint analysis
depsim: a dependency-based malware similarity comparison system
会议论文
OAI收割
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
  |  
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2011/10/10
Behavioral research
Computer crime
Cryptography
Dynamic analysis
Network security
Program processors
Semantics
reconstructing a packed dll binary for static analysis
会议论文
OAI收割
5th International Conference on Information Security Practice and Experience, ISPEC 2009, Xian, China, April 13,
Wang Xianggen
;
Feng Dengguo
;
Su Purui
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2011/03/20
Computer crime
Embedded systems
Security of data
Security systems
Static analysis
reconbin: reconstructing binary file from execution for software analysis
会议论文
OAI收割
3rd International Conference on Secure Software Integration and Reliability Improvement, Shanghai, PEOPLES R CHINA, JUL 08-10,
Ying Lingyun
;
Su Purui
;
Feng Dengguo
;
Wang Xianggen
;
Yang Yi
;
Liu Yu
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2011/03/20
execution monitoring
software security
analysis
malware analysis
binary analysis
exploring malware behaviors based on environment constitution
会议论文
OAI收割
International Conference on Computational-Intelligence and Security, Suzhou, PEOPLES R CHINA, DEC 13-17,
Su Purui
;
Ying Lingyun
;
Feng Dengguo
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2011/06/13
Malware Analysis
Computing Environment Constitution
the design of an artificial immune system
会议论文
OAI收割
the design of an artificial immune system, Beijing CONF, 2006
Purui Su
;
Dengguo Feng
  |  
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2011/07/28
the design of an artificial immune system
会议论文
OAI收割
the design of an artificial immune system, Beijing CONF, 2006
Purui Su
;
Dengguo Feng
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2011/07/28