中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [11]
采集方式
OAI收割 [11]
内容类型
会议论文 [8]
期刊论文 [3]
发表日期
2014 [1]
2013 [5]
2012 [2]
2011 [3]
学科主题
Computer S... [1]
Mathematic... [1]
筛选
浏览/检索结果:
共11条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
CIVSched: A communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs
期刊论文
OAI收割
IEEE Transactions on Cloud Computing, 2014, 卷号: 2, 期号: 3, 页码: 320-332
Guan, Bei (1)
;
Wu, Jingzheng (1)
;
Wang, Yongji (1)
;
Khan, Samee U. (2)
  |  
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2014/12/16
Policykeeper: Recommending Proper Security Mechanisms based on the Severity of Vulnerability Considering User Experience
会议论文
OAI收割
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Yang, Mutian
;
Wu, Jingzheng
;
Wu, Yanjun
;
Wu, Zhifei
  |  
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2014/12/16
security mechanism
recommendation
CVSS
user experience
Vulnerability
Vulnerability Detection of Android System in Fuzzing Cloud
会议论文
OAI收割
IEEE 6th International Conference on Cloud Computing (CLOUD), Santa Clara, CA, JUN 27-JUL 03, 2013
Wu, Jingzheng
;
Wu, Yanjun
;
Yang, Mutian
;
Wu, Zhifei
;
Wang, Yongji
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2014/12/16
Android
Fuzzing
Cloud Computing
Vulnerability Detection
Security Detection
Vulcloud: Scalable and hybrid vulnerability detection in cloud computing
会议论文
OAI收割
7th International Conference on Software Security and Reliability, SERE-C 2013, Gaithersburg, MD, United states, June 18, 2013 - June 20, 2013
Wu, Jingzheng (1)
;
Wu, Yanjun (1)
;
Wu, Zhifei (1)
;
Yang, Mutian (1)
;
Wang, Yongji (2)
  |  
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2014/12/16
Vulnerability Detection
Cloud Computing
Static Analysis
Dynamic Analysis
Fuzz testing
hGuard: A Framework to Measure Hypervisor Critical Files
会议论文
OAI收割
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Ding, Baozeng
;
He, Yeping
;
Zhou, Qiming
;
Wu, Yanjun
;
Wu, Jingzheng
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
Hypervisor
critical files
integrity
measurement
Robust and efficient covert channel communications in operating systems: Design, implementation and evaluation
会议论文
OAI收割
7th International Conference on Software Security and Reliability, SERE-C 2013, Gaithersburg, MD, United states, June 18, 2013 - June 20, 2013
Lin, Yuqi (1)
;
Ding, Liping (1)
;
Wu, Jingzheng (1)
;
Xie, Yalong (1)
;
Wang, Yongji (1)
  |  
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2014/12/16
xenpump: a new method to mitigate timing channel in cloud computing
会议论文
OAI收割
2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012, Honolulu, HI, United states, June 24, 2012 - June 29, 2012
Wu Jingzheng
;
Ding Liping
;
Lin Yuqi
;
Min-Allah Nasro
;
Wang Yongji
  |  
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2013/09/22
Security of data
Virtual reality
national security vulnerability database classification based on an lda topic model
期刊论文
OAI收割
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2012, 卷号: 52, 期号: 10, 页码: 1351-1355
Liao Xiaofeng
;
Wang Yongji
;
Fan Xiubin
;
Wu Jingzheng
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2013/09/17
漏洞分类
隐含Dirichlet分布(LDA)
支持向量机(SVM)
中国国家信息安全漏洞库(CNNVD)
improving performance of network covert timing channel through huffman coding
期刊论文
OAI收割
Mathematical and Computer Modelling, 2011, 卷号: 55, 期号: 1-2, 页码: 69-79
Jingzheng Wu
;
Yongji Wang
;
Liping Ding
;
Xiaofeng Liao
  |  
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2013/10/08
Huffman coding
Network covert channel
Covert channel encoding
Capacity
Covertness
Timing channel
analysis of telephone call detail records based on fuzzy decision tree
会议论文
OAI收割
3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, Shanghai, China, November 1
Ding Liping
;
Gu Jian
;
Wang Yongji
;
Wu Jingzheng
  |  
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2013/10/08
Algorithms
Computer crime
Decision trees
Digital devices
Forestry
Telephone sets
Telephone systems
Trees (mathematics)