Folgen
Jianwei Hou
Titel
Zitiert von
Zitiert von
Jahr
A survey on internet of things security from data perspectives
J Hou, L Qu, W Shi
Computer Networks 148, 295-306, 2019
1282019
A Survey on Digital Forensics in Internet of Things
J Hou, Y Li, J Yu, W Shi
IEEE Internet of Things Journal 7 (1), 1-15, 2019
782019
Detecting Node. js prototype pollution vulnerabilities via object lookup analysis
S Li, M Kang, J Hou, Y Cao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
462021
Mining node. js vulnerabilities via object dependence graph and query
S Li, M Kang, J Hou, Y Cao
31st USENIX Security Symposium (USENIX Security 22), 143-160, 2022
362022
An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention
H Anu, J Chen, W Shi, J Hou, B Liang, B Qin
2019 IEEE International Conference on Software Maintenance and Evolution …, 2019
222019
Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity
L Qu, C Wang, R Xiao, J Hou, W Shi, B Liang
Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing …, 2019
142019
On the fine-grained fingerprinting threat to software-defined networks
J Hou, M Zhang, Z Zhang, W Shi, B Qin, B Liang
Future Generation Computer Systems 107, 485-497, 2020
132020
Fine-grained fingerprinting threats to software-defined networks
M Zhang, J Hou, Z Zhang, W Shi, B Qin, B Liang
2017 IEEE Trustcom/BigDataSE/ICESS, 128-135, 2017
122017
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node. js Taint-style Vulnerability
M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao
2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023
72023
DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN
J Hou, Z Zhang, W Shi, B Qin, L Bin
International Conference on Information and Communications Security, 503-520, 2019
12019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10