Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Tsinghua University(Science and Technology)
1000-0054
2011 Issue 10
Security survey for LBS systems
DAI Zhonghua1;PENG Yong1;ZHAO Tianyu2
..............page:1246-1251
Risk of the vulnerability management mechanisms based on public trading
XIONG Qi;LIU Hui;YI Jin;LIU Lin;ZHANG Tao
..............page:1369-1374
Dynamic detection of interrupt overloads in embedded software using a genetic algorithm
WANG Jie;CUI Kai;ZHOU Kuanjiu;LI Xianjie
..............page:1363-1368
Detection of drive-by downloads based on the frequent embedded subtree pattern-mining algorithm
HAN Xinhui1;2;GONG Xiaorui1;2;ZHUGE Jianwei3;ZOU Lei1;ZOU Wei1;2
..............page:1312-1317
DNS hidden danger analysis and defense strategy based on transparent proxies
PENG Yong1;FAN Lejun2;3;CHEN Dongqing1;CHENG Xueqi2
..............page:1318-1322,1328
Intelligent information security risk assessment based on a decision tree algorithm
ZHANG Li1;YAO Yizhan1;PENG Jianfen2;CHEN Hongbo2;DU Yuge1
..............page:1236-1239
DBMS security audit function test case generation
YE Xiaojun1;LIU Boling1;XIE Feng2;ZHANG Chongbin2;LI Bin2
..............page:1258-1263,1268
On the randomness test and its incompleteness
SHI Hongsong;ZHANG Chongbin;YANG Yongsheng;GAO Jinping
..............page:1269-1273
Evaluation framework for information system security assurance based on a CAE evidence reasoning evaluation model
WANG Yu1;JIANG Changqing2;LIN Jiajun1;YUAN Wenhao1
..............page:1240-1245
Cascade-based attack vulnerability in complex networks
XIE Feng1;CHENG Suqi2;3;CHEN Dongqing1;ZHANG Guoqiang2
..............page:1252-1257
Survey of eclipse attacks on DHT networks
ZOU Wei;ZHANG Yuan;ZHANG Jianyu;ZHOU Mo;LIU Bingshuang
..............page:1306-1311
Risk assessment model for information security based on danger theory
LI Xiaorong1;ZHUANG Yi2;XU Bin2
..............page:1231-1235
Comparison of executable objects based on block signatures and jump relations
CUI Baojiang1;2;MA Ding1;HAO Yongle2;WANG Jianxin3
..............page:1351-1356
Overview of social computing in information security
CHEN Yu1;2;ZHANG Huilin1;2
..............page:1323-1328
Group key agreement scheme for mobile applications
LI Yong1;2;XIONG Yucong1;ZHANG Xiaofei3
..............page:1294-1299
Security analysis of disaster recovery systems using Stochastic Petri Nets
ZHANG Dongyan;CHEN Hongsong
..............page:1281-1286
Privacy protection scheme for cloud computing
MAO Jian1;2;LI Kun1;2;XU Xiandong1
..............page:1357-1362
SINA microblog data retrieval
LIAN Jie1;ZHOU Xin2;CAO Wei2;LIU Yun1
..............page:1300-1305
Disassembly method based on control flow refining
MA Jinxin;HU Chaojian;LI Zhoujun
..............page:1345-1350
Software trustworthness evaluation based on weakness analysis and testing assessment
LI Xiaohong1;WANG Xiangyu1;ZHANG Tao2;YI Jing2;FENG Zhiyong1
..............page:1287-1293
Design and analysis of mobile botnets
GENG Guining1;CHEN Dongqing2;GAO Haihui2;ZHANG Miao1;YANG Guang2
..............page:1329-1334
Network coding anti-eavesdropping system for wireless sensor networks
WANG Yongjian1;XU Junfeng1;YANG Yuwang2;ZHAO Wei2;WANG Lei2
..............page:1341-1344
Software security vulnerability exploitation method based on a security patch
WEN Weiping1;ZHANG Puhan2;XU Youfu1;YIN Liang1
..............page:1264-1268
Security threats and measures for the Internet of Things
YANG Guang1;GENG Guining2;DU Jing1;LIU Zhaohui1;HAN He1
..............page:1335-1340
Evolution of exploitation and exploit mitigation
WEI Qiang1;WEI Tao2;WANG Jiajie3
..............page:1274-1280