[1] |
Huang Huafeng, Wang Jiajie, Yang Yi, Su Purui, Nie Chujiang, Xin Wei.
Automatic Software Vulnerability Discovery and Exploit Under the Limited Resource Conditions
[J]. Journal of Computer Research and Development, 2019, 56(11): 2299-2314.
|
[2] |
Zhang Lei, Yang Zhemin, Li Mingqi, Yang Min.
TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
[J]. Journal of Computer Research and Development, 2019, 56(11): 2315-2329.
|
[3] |
Zhao Shangru, Li Xuejun, Fang Yue, Yu Yuanping, Huang Weihao, Chen Kai, Su Purui, Zhang Yuqing.
A Survey on Automated Exploit Generation
[J]. Journal of Computer Research and Development, 2019, 56(10): 2097-2111.
|
[4] |
Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke.
Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN
[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268.
|
[5] |
Fu Zhiyao, Gao Ling, Sun Qian, Li Yang, Gao Ni.
Evaluation of Vulnerability Severity Based on Rough Sets and Attributes Reduction
[J]. Journal of Computer Research and Development, 2016, 53(5): 1009-1017.
|
[6] |
Fu Xiuwen, Li Wenfeng, Duan Ying.
Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures
[J]. Journal of Computer Research and Development, 2016, 53(12): 2882-2892.
|
[7] |
Chang Qing, Liu Zhongjin, Wang Mengtao, Chen Yu, Shi Zhiqiang, Sun Limin.
VDNS: An Algorithm for Cross-Platform Vulnerability Searching in Binary Firmware
[J]. Journal of Computer Research and Development, 2016, 53(10): 2288-2298.
|
[8] |
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang.
Survey of Android Vulnerability Detection
[J]. Journal of Computer Research and Development, 2015, 52(10): 2167-2177.
|
[9] |
Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen.
Survey of Android OS Security
[J]. Journal of Computer Research and Development, 2014, 51(7): 1385-1396.
|
[10] |
Liu Qixu1, Wen Tao2, and Wen Guanxing1.
Detection of XSS Vulnerabilities in Online Flash
[J]. 计算机研究与发展, 2014, 51(7): 1624-1632.
|
[11] |
Ye Yun, Xu Xishan, Qi Zhichang, and Wu Xueyang.
Attack Graph Generation Algorithm for Large-Scale Network System
[J]. , 2013, 50(10): 2133-2139.
|
[12] |
Cheng Yu, Ma Anguo, Wang Yongwen, Tang Yuxing, and Zhang Minxuan.
Fast and Efficient Prediction of L2 Cache Reliability
[J]. , 2013, 50(1): 181-187.
|
[13] |
Yang Dingning, Xiao Hui, and Zhang Yuqing.
Vulnerability Detection in ActiveX Controls Based on Fuzzing Technology
[J]. , 2012, 49(7): 1525-1532.
|
[14] |
Guo Chi, Wang Lina, Guan Yiping, and Zhang Xiaoying.
A Network Immunization Strategy Based on Dynamic Preference Scan
[J]. , 2012, 49(4): 717-724.
|
[15] |
Wang Wenbin, Sun Qibo, and Yang Fangchun.
Environment-Aware Quantitative Assessment Model for Service Availability in MANET
[J]. , 2012, 49(3): 558-564.
|