1 |
J2EE应用软件的架构安全评估方法
|
期刊论文 |
杜长霄|李晓红|石红|冯志勇| |
2 |
API-level Multi-policy Access Control Enforcement for Android Middleware
|
会议论文 |
Xiaohong Li|Jing Hu|Guangquan Xu|Zhiyong Feng| |
3 |
Universal Analysis and Detection Framework for Location Aided Routing
|
会议论文 |
Xin Zhang|Xiaohong Li|Zhiyong Feng|Guangquan Xu| |
4 |
Improving android security with layered structure instrumentation and Technology
|
期刊论文 |
Zhang Qianqian|Li Xiaohong|Yu Xiaofei|Feng Zhiyong| |
5 |
OOPN-SRAM: A Novel Method for Software Risk Assessment
|
会议论文 |
Ruitao Feng|Guangquan Xu|Jing Hu|Zhiyong Feng| |
6 |
Eliciting security requirements method based on safety knowledge base
|
期刊论文 |
Yu Xiaofei|Li Xiaohong|Zhang Qianqian| |
7 |
Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols
|
期刊论文 |
Li, Xiaohong|Hu, Jing|Feng, Zhiyong|Song, Jiaojiao| |
8 |
Automatic Verification for Later-Correspondence of Security Protocols
|
会议论文 |
Liu, Yang|Li, Li|Feng, Ruitao|Feng, Zhiyong| |
9 |
Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3
|
会议论文 |
Kunding Fang|Xiaohong Li|Jianye Hao|Zhiyong Feng| |
10 |
A threat model-driven security testing approach for web application
|
期刊论文 |
Yan Bobo|Li Xiaohong|Du Zhijie| |
11 |
Model checking with fairness assumptions using PAT
|
期刊论文 |
Dong, Jin Song|Pang, Jun|Zhang, Shao Jie|Yang, Xiaohu| |
12 |
Unified threat model for analyzing and evaluating software threats
|
期刊论文 |
Xiaohong Li|Ke He|Zhiyong Feng|Guangquan Xu| |
13 |
An Extended UML Method for the Verification of Security Protocols
|
会议论文 |
Ruitao Feng|Guangquan Xu|Jing Hu|Zhiyong Feng| |
14 |
Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol
|
期刊论文 |
Li, Xiaohong|Xu, Guangquan|Hu, Jing|Feng, Zhiyong| |
15 |
Web Application Architecture Security Evaluation Method based on AADL
|
会议论文 |
Shaoguang Geng|Xiaohong Li|Zhiyong Feng;Dazhi Sun| |
16 |
Socially-aware Multiagent Learning towards Socially Optimal Outcomes
|
会议论文 |
Xiaohong Li|Chengwei Zhang|Jianye Hao| |
17 |
E-SSL:An SSL Security-Enhanced Metho d for Bypassing MITM Attacks in Mobile Internet
|
会议论文 |
Xiaohong Li|Guangquan Xu|Zhiyong Feng|Jianye Hao| |
18 |
MPOID: Multi-Protocol Oriented Intrusion Detection Method for Wireless Sensor Networks
|
会议论文 |
Qi Guo|Xiaohong Li|Zhiyong Feng|Guangquan Xu| |
19 |
Personalized Recommendation Based on Information Flow in Data Intensive Services
|
期刊论文 |
Guangquan Xu|Xiaohong Li|Zhiyong Feng|Dazhi Sun,| |
20 |
Evolutionary Analysis of Access Control Models: A Formal Concept Analysis Method
|
会议论文 |
Zhuobing Han|Mathieu Mérineau|Xiaohong Li|Ettore Merlo| |
21 |
Hybrid Detection using Permission Analysis for Android Malware
|
会议论文 |
Xiaohong Li|Lei Zhang|Guangquan Xu|Zhiyong Feng| |
22 |
Mining Specification of Insecure Browser Extension Behavior
|
会议论文 |
Hongbin Pei|Xiaohong Li|Guangquan Xu| |
23 |
HyCPK: Securing Identity Authentication in ubiquitous computing
|
会议论文 |
Gaoxu Zhang|Bin Liu|Xiaohong Li|Zhiyong Feng| |
24 |
Proteus:Computing Disjunctive Loop Summary via Path Dependency Analysis
|
会议论文 |
Bihuan Chen|Yang Liu|Wei Le|Xiaohong Li| |
25 |
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection Method for Wireless Sensor Networks
|
期刊论文 |
Qi Guo|Xiaohong Li|Guangquan Xu|Zhiyong Feng| |
26 |
A Hierarchical Security-Auditing Methodology for Cloud Computing
|
会议论文 |
Zhuobing Han|Xiaohong Li|Eleni Stroulia| |
27 |
A Three-Dimensional Model for Software Security Evaluation
|
会议论文 |
Ruitao Feng|Jing Hu|Guangquan Xu|Zhiyong Feng| |
28 |
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor
|
会议论文 |
Xiaohong Li|Jing Hu|Guangquan Xu|Zhiyong Feng| |
29 |
Detection method of the second-order SQL injection in web applications
|
会议论文 |
Xiaohong Li|Ruitao Feng|Zhiyong Feng|Jing Hu| |
30 |
Architecture Security Evaluation Method based on Security of the Components
|
会议论文 |
Shi Hong|Hu Jing|Feng Ruitao|Feng Zhiyong| |
31 |
S-Looper: Automatic Summarization for Multipath String Loops
|
会议论文 |
Yang Liu|Wei Le|Xiaohong Li|Hongxu Chen| |
32 |
Approach to Security Attack Pattern Networks on the Basis of Bayesian Networks
|
期刊论文 |
Xu, Guangquan|Li, Xiaohong|Feng, Zhiyong|Meng, Zhaopeng| |
33 |
Attack Tree Based Android Malware Detection with Hybrid Analysis
|
会议论文 |
Shuai Zhao|Xiaohong Li| |
34 |
A MIH and SDN based Framework for Optimizing Vertical Handover Performance
|
会议论文 |
Feng Liu|Xiaohong Li|Guangquan Xu| |
35 |
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service
|
期刊论文 |
Hao, Jianye|Li, Xiaoru|Feng, Zhiyong|Gao, Honghao| |