复合网络威胁语义上下文分析及推理关键技术研究
序号 | 标题 | 类型 | 作者 |
---|---|---|---|
1 | XSS Vulnerability Scanning Algorithm Based on Anti-Filtering Rules | 会议论文 | Bowen LIU;Jun WANG;Jianyi LIU;Ru ZHANG;Wenxin SUN;Yuangang YAO |
2 | Research on the Privacy-preserving Retrieval over Ciphertext on Cloud | 会议论文 | Zhao Xinyi;Zhang Ru;Weng Fangyu;Liu Jianyi;Yao Yuangang;Zhao XY |
3 | 一种面向移动终端的安全性检测方法及装置 | 专利 | 赵向辉;张利;易锦;刘林;姚原岗;刘彦钊;张磊 |
4 | AN ATTACK PATTERN MINING ALGORITHM BASED ON FUZZY LOGIC AND SEQUENCE PATTERN | 会议论文 | Li Yang;Xue Ying;Liu Jianyi;Zhang Ru;Yao Yuangang;Zhao Xianghui;Li Y |
5 | Privacy Preservation based on Rotation Perturbation in Weighted Social Networks | 会议论文 | Furong Li;Ru Zhang;Yi Xu;Jianyi Liu;Juan Li |
6 | AN ANDROID MALWARE DETECTION METHOD BASED ON ANDROIDMANIFEST FILE | 会议论文 | Li Xiang;Liu Jianyi;Huo Yanyu;Zhang Ru;Yao Yuangang;Li X |
7 | A Framework for Big Data Security Analysis and the Semantic Technology | 会议论文 | Yao Yuangang;Zhang Lei;Yi Jin;Peng Yong;Hu Weihua;Shi Lei;Yao YG |
8 | Detecting false information of SNS in Big Data | 会议论文 | Yi Xu;Jianyi Liu;Ru Zhang;Yuangang Yao |
9 | An Improved Fuzzy Test of Industrial Control System | 会议论文 | Binhe Zhou;Qi Li;Bowen Sun;Yuangang Yao |
10 | Network security log analysis system based on ELK | 会议论文 | Chunjing Lu;Heng Zeng;Jianyi Liu;Ru Zhang;Yuankun Chen;Yuangang Yao |
11 | 一种网址检测方法及装置 | 专利 | 姚原岗;彭勇;易锦;偰赓;李娟;张磊;赵向辉;崔甲;薛莹;张茹 |
12 | EFFICIENTLY SECURE MULTIPARTY COMPUTATION BASED ON HOMOMORPHIC ENCRYPTION | 会议论文 | Yao Yuangang;Wei Jinxia;Liu Jianyi;Zhang Ru;Yao YG |
13 | Security challenges and risk evaluation framework for industrial wireless sensor networks | 会议论文 | Lulu Liang;Yanzhao Liu;Yuangang Yao;Tianshi Yang;Chen Ling |
14 | 一种基于大数据的文件夹断点续传方法 | 专利 | 孟祥杰;田斌;张利;易锦;刘照辉;胡卫华;梁杰;姚原岗;偰赓;刘遥;张鹏;罗鹰;侯勇军;钟峰;田红伟;陈伟清;刘智 |
15 | 基于Xgboost算法的网络入侵检测研究 | 期刊论文 | 张阳;姚原岗 |
16 | PHISHING SITES DETECTION BASED ON URL CORRELATION | 会议论文 | Xue Ying;Li Yang;Liu Jianyi;Zhang Ru;Xue Ying;Li Yang;Yao Yuangang;Zhao Xianghui;Xue Y;Xue Y |