作者: Ma, R.;Zhu, T.;Hu, C.;Shan, C.;Zhao, X. (Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing, China)
出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P359-372
关键词: Finite state machine;Fuzzer;Stateful network protocol;Vulnerability discovering
摘要: Fuzzing has become one of the most important technologies in the field of network security, and fuzzer also has become an important tool for discoveri ...
作者: Wang, Y (Wang, Yong)1;Jiang, CY (Jiang, Chenyang)1;Cheng, JB (Cheng, Jinbiao)1;Wang, XQ (Wang, Xiaoqun)2; (School of Software, Beijing Institute of Technology, Beijing;100081, China Institute of Biophysics, Chinese Academy of Sciences, Beijing;100101, China)
出处: Advances in Intelligent Systems and Computing 2017 Vol.455 P453-461
关键词: ASSOCIATIONS
摘要: Finding key genes associated with diseases is an essential problem of disease diagnosis and treatment, and drug design. Bioinformatics takes advantage ...
作者: Xie Tong1;Wu Lei2; (School of Software, Beijing Institute of Technology Software Quality Engineering Research Centre, The Fifth Electronic Research Institute of MIIT)
出处: MATEC Web of Conferences 2017 Vol.100 P2011
摘要: For decades, industry robotics have delivered on the promise of speed, efficiency and productivity. The last several years have seen a sharp resurgenc ...
作者: Ma, R.1;Chen, S.1;Ma, K.2;Hu, C.1;Wang, X.1; (1Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing, China;2Internet Center, Institute of Communication Standard Research, China Academy of Information and Communication Technology, Beijing, China)
出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P413-426
关键词: Defense;Monitoring neighbor node;Node location information;Wireless sensor networks;Wormhole attack
摘要: Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which ...
作者: LIU CHUANLU1,2;LV GUOHUA2;DONG XIANGJUN2; (d-xj@163.com);YUAN HANNING1; (yhn6@bit.edu.cn);DONG XUE3; (1Beijing Institute of Technology, School of Software, Beijing 100081, China. ;2Qilu University of Technology, School of Information, Jinan 250353, China. ;3Jinan University, Science of Information and Computing, Jinan 250353, China.)
出处: Journal of Residuals Science & Technology 2017 Vol.14 No.1 P407-419
摘要: Positive and negative sequential patterns (PNSP) play an informative role in various applications. In this paper, a new method is proposed to effectiv ...
作者: Xiao-lin ZHAO,Yi-man ZHANG,Hang YA,Xian-hua ZHANG,Yi-ning YANG (School of Software, Beijing Institute of Technology;Beijing Aerospace Control Center)
出处: 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017) 中国北京 2017
会议录: Proceedings of 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)
摘要: Recently, network security is more and more important and the network security measure is the premise to build a robust and secure network. However, t ...
作者: Xiao-lin ZHAO,Quan-bao CHEN,Jia-tong GAO,Xian-hua ZHANG,Jian-yang DING (School of Software, Beijing Institute of Technology;Beijing Aerospace Control Center)
出处: 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017) 中国北京 2017
会议录: Proceedings of 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)
摘要: Recently, the software has been developed increasingly. It is more and more difficult to find software vulnerabilities. Therefore, this paper proposes ...
作者: Zhang, Bo;Liu, Chi Harold;Zhang, Zheng;Ren, Ziyu;Ma, Jian;Wang, Wendong (State Key Lab of Networking and Switching Technology, Beijing University of Posts and Telecom, China School of Software, Beijing Institute of Technology, China School of Information Science and Technology, Tsinghua University, China)
出处: IEEE Vehicular Technology Conference 2017
摘要: Participatory Crowdsourcing System (PCS) is now an important source of information for big data applications. In PCS, required environmental parameter ...
作者: Wang, Y (Wang, Yong)1;Wei, LX (Wei, Longxing)1;Tong, XM (Tong, Xuemin)1;Zhao, XL (Zhao, Xiaolin)1;Li, M (Li, Ming)2; (School of Software, Beijing Institute of Technology, Beijing;100081, China MPS Information Classified Security Protection Evaluation Center, Third Research Institute of Ministry of Public Security, Shanghai;200031, China)
出处: Advances in Intelligent Systems and Computing 2017 Vol.455 P463-472
摘要: CP-ABE (Cipher-text Policy Attribute Based Encryption) can help providing reliable, fine-grained access control in untrusted cloud storage environment ...
作者: Ming Li,Zhikang Piao,Yong Wang (The Third Research Institute of the Ministry of Public Security;58 Corp;School of Software, Beijing Institute of Technology)
出处: 2017 3rd Workshop on Advanced Research and Technology in Industry Applications(WARTIA 2017) 中国广西桂林 2017
会议录: Proceedings of 2017 3rd Workshop on Advanced Research and Technology in Industry Applications(WARTIA 2017)
摘要: Nowadays, smart phones have converted the people’s life style; convenience of the application has a big impact on all aspects of necessities. Consider ...