靶向性复杂攻击网络建模和行为分析研究
序号 | 标题 | 类型 | 作者 |
---|---|---|---|
1 | Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data | 期刊论文 | Ke Huang;Xiaosong Zhang;Xiaofen Wang |
2 | File-centric multi-key aggregate keyword searchable encryption for industrial internet of things | 期刊论文 | Rang Zhou;Xiaosong Zhang;Xiaojiang Du;Xiaofen Wang;Guowu Yang;Mohsen Guizani |
3 | Modeling Attack Process of Advanced Persistent Threat Using Network Evolution | 期刊论文 | Niu Weina;Zhang Xiaosong;Yang Guowu;Chen Ruidong;Wang Dong |
4 | Using XGBoost to Discover Infected Hosts Based on HTTP Traffic | 期刊论文 | Weina Niu;Ting Li;Xiaosong Zhang;Teng Hu;Tianyu Jiang;Heng Wu |
5 | Tor anonymous traffic identification based on gravitational clustering | 期刊论文 | Rao Zhihong;Niu Weina;Zhang XiaoSong;Li Hongwei |
6 | 一种基于TCP数据包和自定义算法的网络通信安全方法 | 专利 | 张小松;牛伟纳;唐海洋;黄婉玉;卢嘉中;张林;李瑞杏;曹思宇;宋珺;许珑于 |
7 | 2017年中央网信办全国网络安全10大优秀人才 | 奖励 | 张小松 |
8 | On the L(2,1)-labeling conjecture for brick product graphs | 期刊论文 | Shao Zehui;Zhang Xiaosong;Jiang Huiqin;Wang Bo;He Juanjuan |
9 | Building Redactable Consortium Blockchain for Industrial Internet-of-Things | 期刊论文 | Huang Ke;Zhang Xiaosong;Mu Yi;Wang Xiaofen;Yang Guomin;Du Xiaojiang;Rezaeibagha Fatemeh;Xia Qi;Guizani Mohsen |
10 | Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device | 期刊论文 | Wang Dong;Zhang Xiaosong;Ming Jiang;Chen Ting;Wang Chao;Niu Weina |
11 | One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications | 期刊论文 | Wang Xiaofen;Mu Yi;Chen Rongmao |
12 | 基于虚拟函数表替换的软件安全防护方法 | 专利 | 张小松;牛伟纳;刘路遥;曹思宇;冯有钲;唐海洋;宋珺 |
13 | Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment | 期刊论文 | Xiaolei Liu;Xiaojiang Du;Xiaosong Zhang;Qingxin Zhu;Mohsen Guizani |
14 | 基于云计算的高可用安全计算环境关键技术及应用 | 奖励 | 马勇;张小松;付萍萍;殷平;李凡 |
15 | A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification | 期刊论文 | Niu Weina;Zhuo Zhongliu;Zhang Xiaosong;Du Xiaojiang;Yang Guowu;Guizani Mohsen |
16 | APT Traffic Detection Based on time transform | 会议论文 | Jiazhong Lu;Xiaosong Zhang;Wang Junfeng;Ying Lingyun |
17 | 基于模拟栈和线程注入的一种ROP攻击栈溢出防护方法 | 专利 | 刘小垒;张小松;牛伟纳;周旷;户宇宙 |
18 | 具有异构感染率的僵尸网络建模与分析 | 期刊论文 | 牛伟纳;张小松;杨国武;卓中流;卢嘉中 |
19 | Trees with Equal Total Domination and 2-Rainbow Domination Numbers | 期刊论文 | Shao Zehui;Sheikholeslami Seyed Mahmoud;Wang Bo;Wu Pu;Zhang Xiaosong |
20 | Botnet Detection Based on Fuzzy Association Rules | 会议论文 | Jiazhong Lu;Fengmao Lv;Quan-Hui Liu;Malu Zhang;Xiaosong Zhang |
21 | Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group | 期刊论文 | Xiaofen Wang;Yi Mu;Rongmao Chen;Xiaosong Zhang |
22 | 一种基于RET指令与JMP指令的ROP攻击检测方法 | 专利 | 张小松;王颖;牛伟纳;陈瑞东;王东;俞工淳;漆艳梅;樊添 |
23 | One-round secure fair meeting location determination based on homomorphic encryption | 期刊论文 | Wang;Xiaofen |
24 | Botnet recognition method based on fuzzy classification | 会议论文 | Dong Wang;Shuangmao Yang;Jiazhong Lu;Ruidong Chen;Xiaosong Zhang |
25 | Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data | 会议论文 | Rang Zhou;Xiaosong Zhang;Xiaofen;WangGuowu;YangWanpeng Li |
26 | 一种基于浏览器标签属性的入侵检测方法及装置 | 专利 | 张小松;刘小垒;牛伟纳;陈瑞东;王东;黄金;罗荣森;向琦;唐海洋 |
27 | Improving data field hierarchical clustering using Barnes–Hut algorithm | 期刊论文 | ZhongliuZhuo;XiaosongZhang;WeinaNiu;GuowuYang;JingzhongZhang |
28 | An Effective Conversation-Based Botnet Detection Method | 期刊论文 | Chen Ruidong;Niu Weina;Zhang Xiaosong;Zhuo Zhongliu;Lv Fengmao |
29 | 物联网设备安全技术 | 专著 | 刘小珍;张小松;朱鲲鹏 |
30 | Website fingerprinting attack on anonymity networks based on profile hidden markov model | 期刊论文 | Zhongliu Zhuo;Yang Zhang;Zhili Zhang;Xiaosong Zhang;Jingzhong Zhang |
31 | 用于漏洞发掘的动态符号执行可视化方法 | 专利 | 张小松;陈厅;张泽亮;牛伟纳;陈瑞东;朱迦南;全威龙;王中晴;周旷 |
32 | 基于流相似性的两阶段P2P僵尸网络检测方法 | 期刊论文 | 牛伟纳;张小松;孙恩博;杨国武;赵凌园 |
33 | DEVICE FOR AUTOMATICALLY GENERATING TEST CASES FOR EMBEDDED SOFTWARE AND METHOD THEREOF | 专利 | Ting Chen;Xiaosong Zhang;Dong Wang;Ruidong Chen;Weina Niu;Xiaofen Wang |
34 | Identifying APT Malware Domain Based on Mobile DNS Logging | 期刊论文 | Niu Weina;Zhang Xiaosong;Yang Guowu;Zhu Jianan;Ren Zhongwei |
35 | A multi-granularity heuristi-combining approach for censorship circumvention activity identification | 期刊论文 | Zhongliu Zhuo;Xiaosong Zhang;Ruixing Li;Ting Chen;Jingzhong Zhang |
36 | XXX的检测 | 奖励 | 何道敬;张小松;周涛;刘虹;郭建 |
37 | 基于树型结构的APT攻击预测方法 | 期刊论文 | 张小松;牛伟纳;杨国武;卓中流;吕凤毛 |
38 | Adversarial Samples on Android Malware Detection Systems for IoT Systems | 期刊论文 | Liu Xiaolei;Du Xiaojiang;Zhang Xiaosong;Zhu Qingxin;Wang Hao;Guizani Mohsen |
39 | Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees | 期刊论文 | Chunming Tang;Zhengchun Zhou;Yanfeng Qi;Xiaosong Zhang;Cuiling Fan;Tor Helleseth |
40 | 一种针对内网端口反弹型木马的防范方法 | 专利 | 张小松;白金;牛伟纳;徐浩然;吴安彬;唐海洋;张林 |
41 | Phishing Emails Detection Using CS-SVM | 会议论文 | Weina Niu;Xiaosong Zhang;Guowu Yang;Zhiyuan Ma;Zhongliu Zhuo |
42 | Modeling Attack Process of Advanced Persistent Threat | 会议论文 | Niu Weina;Zhan Xiaosong;Li Kenli;Yang Guowu;Chen Ruidong |
43 | Adversarial attacks against profile HMM website fingerprinting detection model | 期刊论文 | Liu Xiaolei;Zhuo Zhongliu;Du Xiaojiang;Zhang Xiaosong;Zhu Qingxin;Guizani Mohsen |
44 | 网络环境关键技术及应用 | 奖励 | 张小松;XXX;XXX;XXX;XXX;XXX;牛伟纳;陈瑞东;李洪伟;XXX;鲁力;XXX;XXX;XXX;XXX |
45 | TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems | 期刊论文 | Liu Xiaolei;Zhang Xiaosong;Guizani Nadra;Lu Jiazhong;Zhu Qingxin;Du Xiaojiang |