Jianwei Hou
Citée par
Citée par
A survey on internet of things security from data perspectives
J Hou, L Qu, W Shi
Computer Networks 148, 295-306, 2019
A Survey on Digital Forensics in Internet of Things
J Hou, Y Li, J Yu, W Shi
IEEE Internet of Things Journal 7 (1), 1-15, 2019
Detecting Node. js prototype pollution vulnerabilities via object lookup analysis
S Li, M Kang, J Hou, Y Cao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
Mining node. js vulnerabilities via object dependence graph and query
S Li, M Kang, J Hou, Y Cao
31st USENIX Security Symposium (USENIX Security 22), 143-160, 2022
An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention
H Anu, J Chen, W Shi, J Hou, B Liang, B Qin
2019 IEEE International Conference on Software Maintenance and Evolution …, 2019
Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity
L Qu, C Wang, R Xiao, J Hou, W Shi, B Liang
Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing …, 2019
On the fine-grained fingerprinting threat to software-defined networks
J Hou, M Zhang, Z Zhang, W Shi, B Qin, B Liang
Future Generation Computer Systems 107, 485-497, 2020
Fine-grained fingerprinting threats to software-defined networks
M Zhang, J Hou, Z Zhang, W Shi, B Qin, B Liang
2017 IEEE Trustcom/BigDataSE/ICESS, 128-135, 2017
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node. js Taint-style Vulnerability
M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao
2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023
DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN
J Hou, Z Zhang, W Shi, B Qin, L Bin
International Conference on Information and Communications Security, 503-520, 2019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–10