[1] |
ZHANG Liqun, PAN Zulie, HUANG Hui, WANG Ruipeng, LI Yang.
Research on Automatic Verification Method of Tcache Poisoning Heap Vulnerability Based on Symbolic Execution
[J]. Computer Engineering, 2023, 49(6): 24-33.
|
[2] |
GU Yunjie, WU Changhe, WU Qing, ZHANG Wei, Lü Tianhang, HU Qi, SONG Xiaobin, YAN Jiyu.
Cascade Vulnerability Scanning Engine Deployment Strategy for Delay Optimization
[J]. Computer Engineering, 2023, 49(3): 161-167,176.
|
[3] |
LI Minglei, LU Yuliang, HUANG Hui, ZHU Kailong.
Guided Grey-Box Fuzzing Test Method Combining Distance and Weight
[J]. Computer Engineering, 2021, 47(3): 147-154.
|
[4] |
WANG Hui, ZHAO Ya, ZHANG Juan, LIU Kun.
Research on Attack Path Prediction Based on PANAG Model
[J]. Computer Engineering, 2020, 46(9): 154-162.
|
[5] |
OUYANG Hengyi, XIONG Yan, HUANG Wenchao.
A Formal Modeling and Verification Method for Token Smart Contract
[J]. Computer Engineering, 2020, 46(10): 41-45,51.
|
[6] |
ZHANG Wanying, CAO Xiaomei, CHEN Wei.
Solution for Environment Interaction Problem in Whitebox Fuzz Testing
[J]. Computer Engineering, 2020, 46(1): 216-221.
|
[7] |
WANG Hui, LOU Yalong, DAI Tianwang, RU Xinxin, LIU Kun.
Vulnerability Evaluation Algorithm Based on BNAG Model
[J]. Computer Engineering, 2019, 45(9): 128-135,142.
|
[8] |
LIAO Fangyuan, GAN Zhiwang.
Vulnerability Analysis and Detection of Android System Signature
[J]. Computer Engineering, 2019, 45(8): 25-30.
|
[9] |
ZHOU Weiping, YANG Weiyong, WANG Xuehua, MAO Bing.
Research on Penetration Testing Tool for Industrial Control System
[J]. Computer Engineering, 2019, 45(8): 92-101.
|
[10] |
HUANG He, CHEN Jun, DENG Haojiang.
Fuzzy Testing Algorithm for Modbus/TCP Based on Recurrent Neural Networks
[J]. Computer Engineering, 2019, 45(7): 164-169.
|
[11] |
XIA Zhiyang, YI Ping, YANG Tao.
Static Vulnerability Detection Based on Neural Network and Code Similarity
[J]. Computer Engineering, 2019, 45(12): 141-146.
|
[12] |
CHEN Lu,LIU Xing,CHEN Mu,LI Nige,DAI Zaojian.
Scalable Security Evaluation Model of Mobile Application Based on Graph
[J]. Computer Engineering, 2018, 44(5): 78-82.
|
[13] |
LIU Chuang,LÜ Na,CHEN Kefan,ZHANG Bushuo,CAO Fangbo.
An Unmanned Aerial Vehicle Relay Network Deployment Strategy for Aeronautic Swarm
[J]. Computer Engineering, 2018, 44(5): 107-112,123.
|
[14] |
WANG Yan,LIU Jiayong,LIU Liang,JIA Peng,LIU Luping.
Research on Vulnerability Utilization Tool Development Framework
[J]. Computer Engineering, 2018, 44(3): 127-131.
|
[15] |
GUO Xiaocheng,MA Runnian,WANG Gang.
Modeling and Simulation of Cascading Failure in Command and Control Network
[J]. Computer Engineering, 2018, 44(2): 294-297.
|