Folgen
Jianwei Zhuge
Jianwei Zhuge
Associate Professor, Tsinghua University
Bestätigte E-Mail-Adresse bei cernet.edu.cn - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Research and development of botnets
J Zhuge, X Han, Y Zhou, Z Ye, W Zou
Journal of Software 19 (3), 2008
187*2008
Studying malicious websites and the underground economy on the Chinese web
J Zhuge, T Holz, C Song, J Guo, X Han, W Zou
Managing information risk and the economics of security, 225-244, 2009
1752009
Characterizing the irc-based botnet phenomenon
J Zhuge, T Holz, X Han, J Guo, W Zou
None, 2007
1062007
IntentFuzzer: detecting capability leaks of android applications
K Yang, J Zhuge, Y Wang, L Zhou, H Duan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1052014
Collecting autonomous spreading malware using high-interaction honeypots
J Zhuge, T Holz, X Han, C Song, W Zou
Information and Communications Security: 9th International Conference, ICICS …, 2007
1022007
A network anomaly detector based on the DS evidence theory
JW ZHUGE, DW WANG, Y Chen, ZY YE, W ZOU
Journal of software 17 (3), 463-471, 2006
82*2006
Research on botnet mechanisms and defenses
江健, 诸葛建伟, 段海新, 吴建平
Journal of Software 23 (1), 82-96, 2012
74*2012
A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices
M Yu, J Zhuge, M Cao, Z Shi, L Jiang
Future Internet 12 (2), 27, 2020
672020
De-‐obfuscation and Detection of Malicious PDF Files with High Accuracy
X Lu, T Cyberspace, J Zhuge, R Wang, Y Cao, Y Chen
HICSS‘46, 2013
642013
WebPatrol: Automated collection and replay of web-based malware scenarios
KZ Chen, G Gu, J Zhuge, J Nazario, X Han
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
632011
Honeypot technology research and application
诸葛建伟, 唐勇, 韩心慧, 段海新
Journal of Software 24 (4), 825-842, 2013
50*2013
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007
50*2007
Study on BGP security
S Li, JW Zhuge, X Li
Ruanjian Xuebao/Journal of Software 24 (1), 121-138, 2013
46*2013
{FANS}: Fuzzing android native system services via automated interface analysis
B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge
29th USENIX Security Symposium (USENIX Security 20), 307-323, 2020
452020
Jtrans: Jump-aware transformer for binary code similarity detection
H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
342022
Network attack plan recognition algorithm based on the extended goal graph
JW Zhuge, XH Han, ZY Ye, W Zou
Chinese Journal of Computers 29 (8), 1356-1366, 2006
34*2006
JShield: Towards real-time and vulnerability-based detection of polluted drive-by download attacks
Y Cao, X Pan, Y Chen, J Zhuge
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
322014
Research on Classification of Attack Technologies
J ZHUGE, Z YE, W ZOU
Computer Engineering 21, 121-123, 2005
32*2005
Preventing drive-by download via inter-module communication monitoring
C Song, J Zhuge, X Han, Z Ye
Proceedings of the 5th ACM symposium on information, computer and …, 2010
272010
A market in dream: the rapid development of anonymous cybercrime
G Zhou, J Zhuge, Y Fan, K Du, S Lu
Mobile Networks and Applications 25, 259-270, 2020
252020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20