Jianwei Zhuge
Jianwei Zhuge
Associate Professor, Tsinghua University
Email verificata su cernet.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Research and development of botnets
J Zhuge, X Han, Y Zhou, Z Ye, W Zou
Journal of Software 19 (3), 2008
232*2008
Studying malicious websites and the underground economy on the Chinese web
J Zhuge, T Holz, C Song, J Guo, X Han, W Zou
Managing information risk and the economics of security, 225-244, 2009
1532009
Characterizing the irc-based botnet phenomenon
J Zhuge, T Holz, X Han, J Guo, W Zou
1032007
A network anomaly detector based on the DS evidence theory
JW ZHUGE, DW WANG, Y Chen, ZY YE, W ZOU
Journal of software 17 (3), 463-471, 2006
96*2006
Collecting autonomous spreading malware using high-interaction honeypots
J Zhuge, T Holz, X Han, C Song, W Zou
International Conference on Information and Communications Security, 438-451, 2007
802007
Research on botnet mechanisms and defenses
J Jiang, JW Zhuge, HX Duan, JP Wu
Ruanjian Xuebao/Journal of Software 23 (1), 82-96, 2012
73*2012
IntentFuzzer: detecting capability leaks of android applications
K Yang, J Zhuge, Y Wang, L Zhou, H Duan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
702014
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007
59*2007
WebPatrol: Automated collection and replay of web-based malware scenarios
KZ Chen, G Gu, J Zhuge, J Nazario, X Han
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
542011
Network attack plan recognition algorithm based on the extended goal graph
JW Zhuge, XH Han, ZY Ye, W Zou
Chinese Journal of Computers 29 (8), 1356-1366, 2006
44*2006
Research on Classification of Attack Technologies
J ZHUGE, Z YE, W ZOU
Computer Engineering 21, 121-123, 2005
43*2005
De-‐obfuscation and Detection of Malicious PDF Files with High Accuracy
X Lu, T Cyberspace, J Zhuge, R Wang, Y Cao, Y Chen
HICSS‘46, 2013
402013
Honeypot technology research and application
JW Zhuge, Y Tang, XH Han, HX Duan
Ruanjian Xuebao/Journal of Software 24 (4), 825-842, 2013
33*2013
Study on BGP security
S Li, JW Zhuge, X Li
Ruanjian Xuebao/Journal of Software 24 (1), 121-138, 2013
33*2013
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007
302007
Preventing drive-by download via inter-module communication monitoring
C Song, J Zhuge, X Han, Z Ye
Proceedings of the 5th ACM symposium on information, computer and …, 2010
292010
僵尸网络的发现与跟踪
诸葛建伟, 韩心慧, 叶志远, 邹维
全国网络与信息安全技术研讨会, 2005
24*2005
Jshield: towards real-time and vulnerability-based detection of polluted drive-by download attacks
Y Cao, X Pan, Y Chen, J Zhuge
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
212014
Investigation on the botnets activities
X Han, J Guo, Y Zhou, J Zhuge, W Zou
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 167, 2007
21*2007
An Attack Knowledge Model Based on Object-Oriented Technology [J]
J ZHUGE, H XU, A PAN
Journal of Computer Research and Development 41 (7), 1110-1116, 2004
19*2004
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20