作者: Rui Ma,Shuaimin Ren,Ke Ma,Changzhen Hu,Jingfeng Xue (the Beijing Key Laboratory of Software Security Engineering Technology,School of Software,Beijing Institute of Technology;the Internet Center,Institute of Communication Standard Research,China Academy of Information and Communication Technology)
出处: Tsinghua Science and Technology 2017 第22卷 第5期 P458-468
关键词: 测试用例生成;网络协议;状态转换;模糊测试;扩展有限状态机;测试序列;有效算法;变异操作
摘要: Network protocols are divided into stateless and stateful.Stateful network protocols have complex communication interactions and state transitions.How ...
作者: Zheng, Y.;Lv, K.;Hu, C. (School of Software, Beijing Institute of Technology, Beijing, China)
出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P349-358
关键词: Attack graph;Network security;Risk judgement;Vulnerability
摘要: With the rapid development of network, network security issues become increasingly important. It is a tough challenge to evaluate the network security ...
作者: Dong, Y.;Liu, Z.;Yan, Y.;Wang, Y.;Peng, T.;Zhang, J. (School of Software, Beijing Institute of Technology, Beijing, China)
出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P386-398
关键词: Analyzing malware;Association analysis;Classification;Clustering;Machine learning
摘要: The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwa ...
作者: XiaoLin Zhao1;Quanbao Chen1;Chun Shan1;Ting Wang1;Yiman Zhang1; (School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China)
出处: Journal of Physics: Conference Series 2017 Vol.887 Conference 1 P012071
摘要: It is extremely important for the study of software behavior modeling for software security research. This article determines whether the security of ...
作者: Zhao, Xiaolin1;Xue, Jingfeng1;Zhang, Yiman1;Zhang, Qi1; (1School of Software, Beijing Institute of Technology, Beijing, 100081, China)
出处: Frontiers in Artificial Intelligence and Applications 2017 Vol.299 P494-510
关键词: Collaborative;Complex network;Network security;Software metrics
摘要: The traditional and mainstream method to study the software system with the complex network is building a collaborative network of the software system ...
作者: Yang, Shucheng;Yang, Yichuan;Miao, Xinyu (School of Software, Beijing Institute of Technology, Beijing;100081, China)
出处: ACM International Conference Proceeding Series 2017 P38-43
摘要: Restaurant recommended software has been a lot, but for many people have not yet dinner, more than dinner to consider not only everyone\'s preferences ...
作者: Chen, Y.1;Lv, K.2;Hu, C.2; (1School of Computer and Information Engineering, Henan University, Kaifeng, China;2School of Software, Beijing Institute of Technology, Beijing, China)
出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P399-412
关键词: Attack graph;Optimal attack path;Supervised Kohonen neural network
摘要: Attack graph is a general paradigm to model the weakness of an information system network and all possible attack sequences that attackers can obtain ...
作者: Jiehao Chen,Ziqian Zhao,Jiyun Shi,Chong Zhao (School of Software, Beijing Institute of Technology)
出处: 2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017) 中国重庆 2017
会议录: Proceedings of 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC 2017)
关键词: Top-N;Recommendation;Timeliness;recent;Feedback;Learning;to;Rank;Online;Learning
摘要: Currently, the research on recommend system has drawn intensive attention from many researchers. However, it is still a concerned focus to make accura ...
作者: Peng Li (School of Software Beijing Institute of Technology)
出处: 2017 IEEE 8th International Conference on Software Engineering and Service Science 中国北京 2017
会议录: Proceedings of 2017 IEEE 8th International Conference on Software Engineering and Service Science
摘要: Object-Relational Mapping(ORM) is often used between tiers in a Web-based system to automate the persistence of data to secondary storage. ORMs work b ...
作者: Xiao-Jun Xu,Jin-Song Bao,Bin Yao,Member CCF ACM IEEE Jing-Yu Zhou,Fei-Long Tang,Member CCF ACM IEEE Min-Yi Guo,Senior Member IEEE Member CCF ACM Jian-Qiu Xu (School of Software, Beijing Institute of Technology, Beijing 100081, China;College of Mechanical Engineering, Donghua University, Shanghai 200051, China;Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai 200240, China;College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China)
出处: 计算机科学技术学报(英文版) 2017 第32卷 第1期 P155-167
关键词: reverse;furthest;neighbor;road;network;landmark;hierarchical;partition
摘要: Given a road network G=(V, E), where V (E) denotes the set of vertices(edges) in G, a set of points of interest P and a query point q residing in G, t ...