Author of the publication

Dynamic Tracking Reinforcement Based on Simplified Control Flow.

, , and . CIS, page 358-362. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)A Quantitative Method for Evaluating Network Security Based on Attack Graph., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 349-358. Springer, (2017)SulleyEX: A Fuzzer for Stateful Network Protocol., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 359-372. Springer, (2017)Software structure characteristic measurement method based on weighted network., , , , and . Comput. Networks, (2019)Defeating buffer overflow attacks via virtualization., , , and . Comput. Electr. Eng., 40 (6): 1940-1950 (2014)A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments., , and . Secur. Commun. Networks, (2018)MaliCage: A packed malware family classification framework based on DNN and GAN., , , and . J. Inf. Secur. Appl., (2022)MDCHD: A novel malware detection method in cloud using hardware trace and deep learning., , , , , and . Comput. Networks, (2021)Security Feature Measurement for Frequent Dynamic Execution Paths in Software System., , , , , and . Secur. Commun. Networks, (2018)A Virtualization-Based Approach for Application Whitelisting., , , and . IEICE Trans. Inf. Syst., 97-D (6): 1648-1651 (2014)