Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Tsinghua University(Science and Technology)
1000-0054
2009 Issue S2
Business process status-based risk analysis
LI Bing;WANG Shengyuan;BAO Xuhua;SHA Hailiang
..............page:2144-2148
SAT-based technique to detect buffer overflows in C source codes
CHEN Shikun1;LI Zhoujun2;HUANG Yonggang3;XING Jianying1
..............page:2169-2175
Quantitative evaluation of vulnerability exploitability in network information systems
YANG Hongyu;ZHU Dan;XIE Lixia
..............page:2157-2163
Automatic verification of possible software doubtful defects
CHENG Shaoyin;JIANG Fan;LIN Jinbin;TANG Yanwu
..............page:2222-2227
Binary code execution path based on symbolic and actual program execution
CUI Baojiang1;GUO Pengfei1;WANG Jianxin2
..............page:2186-2192
Secure acquisition model for information technology and service based on CMM-ACQ
DU Jing1;2;WANG Qing1;WANG Zong3
..............page:2149-2156
Web application threat modeling and quantitative assessment
WANG Hongbing
..............page:2108-2112
Overview security analysis of 3G authentication protocols and technical specifications
CAO Chenlei1;2;ZHANG Ru1;2;NIU Xinxin1;2;ZHOU Linna3;ZHANG Zhentao4
..............page:2193-2199
Buffer overflow detection based on the structure of fine-grained logic isolation
LI Chen;LI Ruihua;ZHANG Xing;ZHUANG Lu
..............page:2138-2143
VoIP network perimeter defense system
HUANG Wei1;2;LIANG Hongliang1;2;HU Zhengming1;2;YANG Yixian1;2
..............page:2215-2221
Detection of drive-by downloads based on dynamic page views
ZHANG Huilin1;2;ZHUGE Jianwei1;2;SONG Chengyu1;2;HAN Xinhui1;2;ZOU Wei1;2
..............page:2126-2132
Enterprise architecture to enhance security and risk management of information systems
Kwok-Yan Lam;LI Longxuan;GU Ming
..............page:2073-2086
Executable based vulnerability detection
HU Chaojian1;ZHANG Jia1;LI Zhoujun1;SHI Zhiwei2;ZHANG Yan1
..............page:2176-2180
Detection the covert channels based on MSN VoIP
HUANG Yongfeng;YUAN Jian;CHEN Shumei;WANG Jun
..............page:2200-2207
Quantitative assessment of survivability of network storage systems
ZHANG Yi;HUO Shanshan
..............page:2119-2125
Optimization of Büchi automata by language equivalence relationships
YI Jin;GUO Tao;HUANG Yonggang;ZHANG Puhan
..............page:2181-2185
Software vulnerability economy:Current situation and prospects
WEI Tao1;WANG Guisi2;ZOU Wei1
..............page:2087-2096
Power analysis resistant AES crypto engine design for a network security co-processor
WU Liji1;JI Yingjie1;ZHANG Xiangmin1;LI Xiangyu1;YANG Yongsheng2
..............page:2097-2102
Web page malicious code detection based on embedded fingerprints
HUANG Jianjun;LIANG Bin
..............page:2208-2214
Theoretical model for the security risk quantitative analysis of large software R&D projects
WANG Changfeng1;2;WANG Hualan1
..............page:2103-2107
Operation system recognition based on support vector machines
ZOU Tiezheng;LI Yuan;ZHANG Bofeng;SU Jinshu
..............page:2164-2168
Network protocol vulnerability discovery based on fuzzy testing
ZHANG Baofeng;ZHANG Chongbin;XU Yuan
..............page:2113-2118
EL-BLP security model in local area networks
XUE Haiwei1;XU Changxing2;LIN Jie1;DU Jing2;DAI Yiqi1
..............page:2228-2232