Zhaoyan Xu
Zhaoyan Xu
Email verificata su cse.tamu.edu - Home page
Titolo
Citata da
Citata da
Anno
Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications
C Yang, Z Xu, G Gu, V Yegneswaran, P Porras
European symposium on research in computer security, 163-182, 2014
2012014
A memory model for static analysis of C programs
Z Xu, T Kremenek, J Zhang
International Symposium On Leveraging Applications of Formal Methodsá…, 2010
622010
Review of groundwater recharge estimation in arid and semi-arid Southern Africa
HE Beekman, Y Xu
Council for Scientific and Industrial Research (South Africa) and Universityá…, 2003
622003
Srid: State relation based intrusion detection for false data injection attacks in scada
Y Wang, Z Xu, J Zhang, L Xu, H Wang, G Gu
European Symposium on Research in Computer Security, 401-418, 2014
602014
EFFORT: Efficient and effective bot malware detection
S Shin, Z Xu, G Gu
INFOCOM, 2012 Proceedings IEEE, 2846-2850, 2012
572012
Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices
T Luo, Z Xu, X Jin, Y Jia, X Ouyang
Black Hat, 1-11, 2017
502017
Cyberprobe: Towards internet-scale active detection of malicious servers
A Nappa, Z Xu, MZ Rafique, J Caballero, G Gu
In Proceedings of the 2014 Network and Distributed System Security Symposiumá…, 2014
392014
PeerPress: utilizing enemies' P2P strength against them
Z Xu, L Chen, G Gu, C Kruegel
Proceedings of the 2012 ACM conference on Computer and communicationsá…, 2012
342012
GoldenEye: Efficiently and Effectively Unveiling Malware’s Targeted Environment
Z Xu, J Zhang, G Gu, Z Lin
International Workshop on Recent Advances in Intrusion Detection, 22-45, 2014
332014
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis
Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communicationsá…, 2014
322014
Path and context sensitive inter-procedural memory leak detection
Z Xu, J Zhang
2008 The Eighth International Conference on Quality Software, 412-420, 2008
242008
Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks
J Zhang, C Yang, Z Xu, G Gu
International Workshop on Recent Advances in Intrusion Detection, 230-253, 2012
202012
Poisonamplifier: a guided approach of discovering compromised websites through reversing search poisoning attacks
J Zhang, C Yang, Z Xu, G Gu
Research in Attacks, Intrusions, and Defenses, 230-253, 2012
202012
EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection
S Shin, Z Xu, G Gu
Computer Networks 57 (13), 2628-2642, 2013
192013
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization
Z Xu, J Zhang, G Gu, Z Lin
Distributed Computing Systems (ICDCS), 2013 IEEE 33rd Internationalá…, 2013
192013
PRIDE: Practical intrusion detection in resource constrained wireless mesh networks
A Hassanzadeh, Z Xu, R Stoleru, G Gu, M Polychronakis
International Conference on Information and Communications Security, 213-228, 2013
182013
Groundwater quality assessments in the John Laing and
DCW Nkhuwa
Groundwater pollution in Africa, 239, 2006
172006
Towards the resource directed measures: groundwater component
Y Xu, C Colvin, GJ Van Tonder, S Hughes, D Le Maitre, J Zhang, ...
Water Research Commission Report, 1, 2003
172003
Application of the rainfall infiltration breakthrough (RIB) model for groundwater recharge estimation in west coastal South Africa
Y Xu, NZ Jovanovic, E Kapangaziwiri, L Brendonck, RDH Bugan
Water Sa 39 (2), 221-230, 2013
162013
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks
A Hassanzadeh, Z Xu, R Stoleru, G Gu, M Polychronakis
computers & security 62, 114-132, 2016
142016
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20