Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Weixuan Mao"'
Publikováno v:
IEEE Access, Vol 7, Pp 33380-33392 (2019)
The development of mobile computing systems is an inherently collaborative activity, and the nature of the collaboration likely affects systems success. Collaboration can lead to faster development of systems and increased creativity, but it may also
Externí odkaz:
https://doaj.org/article/86e168d412bc4241b91166bfba89eb85
Publikováno v:
Energies, Vol 14, Iss 1, p 106 (2020)
Supercritical carbon dioxide (SC-CO2) jet is capable of decreasing the threshold pressure of rock breakage and mitigating formation damage, owing to its low viscosity, high diffusivity, and extremely-low surface tension. The swirling-round jet holds
Externí odkaz:
https://doaj.org/article/a7517edc748441ffb64aeed8ad15fef7
Autor:
Hui Xue, Bo Sun, Weixuan Mao, Jianjun Lin, Yijing Zhang, Xiaoyu Liu, Xiaodu Yang, Ziqian Chen
Publikováno v:
2022 IEEE International Conference on Big Data (Big Data).
Publikováno v:
Energies, Vol 14, Iss 106, p 106 (2021)
Energies; Volume 14; Issue 1; Pages: 106
Energies; Volume 14; Issue 1; Pages: 106
Supercritical carbon dioxide (SC-CO2) jet is capable of decreasing the threshold pressure of rock breakage and mitigating formation damage, owing to its low viscosity, high diffusivity, and extremely-low surface tension. The swirling-round jet holds
Publikováno v:
Data Mining and Knowledge Discovery. 33:168-203
The cloud based security service generates a new type of security data, which indicates the occurrence of executable files in end hosts. With the basis of the security data, semi-supervised learning on file co-occurrence graph provides a novel perspe
Publikováno v:
Computers & Security. 74:167-183
The deployment of endpoint protection has been gradually migrated from individual clients to remote cloud servers, which is termed as cloud based security service. The new paradigm of security defense produces a large amount of data and log files, an
Publikováno v:
Computers & Security. 68:47-68
System objects play different roles in computer systems and exhibit different levels of importance to system security. Assessing the importance of system objects helps us develop effective security protection methods. However, little work has focused
Autor:
He Su, Wei Huo, Zimu Yuan, Weixuan Mao, Ban Gu, Shiyang Wang, Yang Xiao, Wei Wang, Jiahuan Xu, Qian Tang, Liu Binghong, Feng Muyue
Publikováno v:
SANER
Open-source licenses are widely used in open-source projects. However, developers using or modifying the source code of open-source projects do not always strictly follow the licenses. GPL and AGPL, two of the most popular copyleft licenses, are most
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030002138
Malicious code is the root cause of many security incidents and still the major threats for the Internet. Understandings on the access behaviors of programs provide ways of malware detection. In this paper, we propose a graph based representations fo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::98051f52633a23ea2c7ad901c8282092
https://doi.org/10.1007/978-3-030-00214-5_153
https://doi.org/10.1007/978-3-030-00214-5_153
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319205496
DIMVA
DIMVA
Identifying whether system objects are infected or not on a compromised system is a complex and error-prone task. Most existing solutions follow a traditional causal analysis method which tries to precisely correlate potential infected objects with t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2695082f2f6fedfc60cd24390a95fc24
https://doi.org/10.1007/978-3-319-20550-2_16
https://doi.org/10.1007/978-3-319-20550-2_16