Suivre
Jianwei Zhuge
Jianwei Zhuge
Associate Professor, Tsinghua University
Adresse e-mail validée de cernet.edu.cn - Page d'accueil
Titre
Citée par
Citée par
Année
Research and development of botnets
J Zhuge, X Han, Y Zhou, Z Ye, W Zou
Journal of Software 19 (3), 2008
189*2008
Studying malicious websites and the underground economy on the Chinese web
J Zhuge, T Holz, C Song, J Guo, X Han, W Zou
Managing information risk and the economics of security, 225-244, 2009
1762009
IntentFuzzer: detecting capability leaks of android applications
K Yang, J Zhuge, Y Wang, L Zhou, H Duan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1072014
Characterizing the irc-based botnet phenomenon
J Zhuge, T Holz, X Han, J Guo, W Zou
None, 2007
1062007
Collecting autonomous spreading malware using high-interaction honeypots
J Zhuge, T Holz, X Han, C Song, W Zou
Information and Communications Security: 9th International Conference, ICICS …, 2007
1052007
A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices
M Yu, J Zhuge, M Cao, Z Shi, L Jiang
Future Internet 12 (2), 27, 2020
922020
A network anomaly detector based on the DS evidence theory
JW ZHUGE, DW WANG, Y Chen, ZY YE, W ZOU
Journal of software 17 (3), 463-471, 2006
80*2006
Research on botnet mechanisms and defenses
江健, 诸葛建伟, 段海新, 吴建平
Journal of Software 23 (1), 82-96, 2012
76*2012
De-‐obfuscation and Detection of Malicious PDF Files with High Accuracy
X Lu, T Cyberspace, J Zhuge, R Wang, Y Cao, Y Chen
HICSS‘46, 2013
662013
Jtrans: Jump-aware transformer for binary code similarity detection
H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
642022
WebPatrol: Automated collection and replay of web-based malware scenarios
KZ Chen, G Gu, J Zhuge, J Nazario, X Han
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
642011
{FANS}: Fuzzing android native system services via automated interface analysis
B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge
29th USENIX Security Symposium (USENIX Security 20), 307-323, 2020
552020
Honeypot technology research and application
诸葛建伟, 唐勇, 韩心慧, 段海新
Journal of Software 24 (4), 825-842, 2013
53*2013
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007
50*2007
Study on BGP security
S Li, JW Zhuge, X Li
Ruanjian Xuebao/Journal of Software 24 (1), 121-138, 2013
48*2013
JShield: Towards real-time and vulnerability-based detection of polluted drive-by download attacks
Y Cao, X Pan, Y Chen, J Zhuge
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
342014
Network attack plan recognition algorithm based on the extended goal graph
JW Zhuge, XH Han, ZY Ye, W Zou
Chinese Journal of Computers 29 (8), 1356-1366, 2006
32*2006
Research on Classification of Attack Technologies
J ZHUGE, Z YE, W ZOU
Computer Engineering 21, 121-123, 2005
32*2005
A market in dream: the rapid development of anonymous cybercrime
G Zhou, J Zhuge, Y Fan, K Du, S Lu
Mobile Networks and Applications 25, 259-270, 2020
272020
Preventing drive-by download via inter-module communication monitoring
C Song, J Zhuge, X Han, Z Ye
Proceedings of the 5th ACM symposium on information, computer and …, 2010
272010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20