Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine
Yan Wen;Jinjing Zhao;Huaimin Wang
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Yan Wen;Jinjing Zhao;Huaimin Wang;Jiannong Cao
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
A Novel Intrusion-Tolerant Approach for Internet Access
Yan Wen;Jinjing Zhao;Huaimin Wang
ISIP '08 Proceedings of the 2008 International Symposiums on Information Processing
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor
Yan Wen;Jinjing Zhao;Huaimin Wang
Proceedings of the 4th international conference on Security and privacy in communication netowrks
On the power-law of the internet and the hierarchy of BGP convergence
Peidong Zhu;Jinjing Zhao;Yan Wen;Kaiyu Cai
ICA3PP'07 Proceedings of the 7th international conference on Algorithms and architectures for parallel processing
A secure virtual execution environment for untrusted code
Yan Wen;Huaimin Wang
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
A novel approach for untrusted code execution
Yan Wen;Jinjing Zhao;Huaimin Wang
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way
Yan Wen;Jinjing Zhao;Minhuan Huang;Hua Chen
IMIS '11 Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
H-fuzzing: a new heuristic method for fuzzing data generation
Jinjing Zhao;Yan Wen;Gang Zhao
NPC'11 Proceedings of the 8th IFIP international conference on Network and parallel computing
HotSpotInsight: A Java Application Introspection Platform Based on JVM
Yan Wen;Jinjing Zhao;Hua Chen;Jianbo Zhang
IMCCC '11 Proceedings of the 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control
Towards Detecting Thread Deadlock in Java Programs with JVM Introspection
Yan Wen;Jinjing Zhao;Minhuan Huang;Hua Chen
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
An Overview of Bootkit Attacking Approaches
Xiang Li;Yan Wen;Min Huan Huang;Qiang Liu
MSN '11 Proceedings of the 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution
Yan Wen;Jinjing Zhao;Gang Zhao;Hua Chen;Dongxia Wang
IMIS '12 Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Reversing Engineering Data Structures in Binary Programs: Overview and Case Study
Xiao Xia Sun;Hua Chen;Yan Wen;Min Huan Huang
IMIS '12 Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
The Relation on Prefix Hijacking and the Internet Hierarchy
Jinjing Zhao;Yan Wen;Xiang Li;Wei Peng;Feng Zhao
IMIS '12 Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Emulation on the internet prefix hijacking attack impaction
Jinjing Zhao;Yan Wen
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Hi-index | 354.97 |
H-index | 2 |
P-index | 2.7833 |
up-index | 4.3886 |