Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Qi-xu LIU"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 128-143 (2017)
The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitiv
Externí odkaz:
https://doaj.org/article/efe8ce07fa404c26911658b2f33b149e
Publikováno v:
Tongxin xuebao, Vol 37, Pp 11-19 (2016)
With the rapid rising of Web server-based botnets,traditional channel models were unable to predict threats from them.Based on improving traditional Webshell control method,a command and control channel model based on tree structure was proposed.The
Externí odkaz:
https://doaj.org/article/6f904c8e1ed54286855478ed3161d569
Publikováno v:
Tongxin xuebao, Vol 36, Pp 235-244 (2015)
Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing di
Externí odkaz:
https://doaj.org/article/796e3da67a144ff6b9536d39cc0b5795
Publikováno v:
Tongxin xuebao, Vol 35, Pp 117-123 (2014)
To improve the security of NFC technology,a research is done for discovering NDEF vulnerabilities of NFC applications on Android platform,and a method of bug hunting is proposed on based Fuzzing technology.The method adopts manual craft,the generatio
Externí odkaz:
https://doaj.org/article/81fdd8afffb042d3ade98d372840ab18
Publikováno v:
Tongxin xuebao, Vol 35, Pp 1-11 (2014)
Third-party tracking can record users' behaviors across many websites.Increasing attention has been paid to the area of third-party tracking due to the fact that user's privacy protection is causing wider concern.The basic concept and present develop
Externí odkaz:
https://doaj.org/article/4264cf771a744fc2a89ebc65ffa3ae2e
Publikováno v:
Tongxin xuebao, Vol 34, Pp 106-115 (2013)
The permissions requested by Android applications reflect the behavior sequence of the application. While a generation of malicious behavior usually requires the cooperation of multiple permissions, so mining the association be-tween permissions can
Externí odkaz:
https://doaj.org/article/d44a9b404f4443b18b803616eb744bbd
Publikováno v:
Tongxin xuebao, Vol 33, Pp 79-87 (2012)
In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method w
Externí odkaz:
https://doaj.org/article/c87c08c6b1b1451b86bc78c96f91788d