2009年论文
2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2005 2004 2002
- [1] Li J, Zheng N, Xu M, et al. Malware behavior extracting via maximal patterns[C]. Nanjing, China: IEEE Computer Society, 2009. [PDF] [BibTex]
- [2] Li J, Xu M, Zheng N, et al. Malware obfuscation detection via maximal patterns[C]. NanChang, China: IEEE Computer Society, 2009. [PDF] [BibTex]
- [3] Jian L, Jun X, Ming X, et al. Malware obfuscation measuring via evolutionary similarity[C]. Beijing, China: IEEE Computer Society, 2009. [PDF] [BibTex]
- [4] Zhao H, Zheng N, Li J, et al. Unknown malware detection based on the full virtualization and SVM[C]. Nanchang, China: IEEE Computer Society, 2009. [PDF] [BibTex]
- [5] Xu M, Dong S. Reassembling the fragmented JPEG images based on sequential pixel prediction[C]. Wuhan, China: IEEE Computer Society, 2009. [PDF] [BibTex]
- [6] Lou Y, Wang P, Xu M, et al. Automated event log file recovery based on content characters and internal structure[C]. Nanjing, China: IEEE Computer Society, 2009. [PDF] [BibTex]
- [7] Tang Z, Ding H, Xu M, et al. Carving the windows registry files based on the internal structure[C]. Nanjing, China: IEEE Computer Society, 2009. [PDF] [BibTex]
- [8] 费淑芳,郑宁,余日泰,等. 模糊关联规则算法在入侵检测中的应用[J]. 计算机应用与软件. 2009(03): 95-96. [PDF]
- [9] 丁莉娜,郑宁,孔霆,等. 利用POMDP模型来增强分布式系统的生存性[J]. 计算机应用与软件. 2009(01): 91-92. [PDF]
- [10] 范轩苗,郑宁,范渊. Web入侵检测系统高效多模式匹配算法[J]. 计算机应用研究. 2009(04): 1528-1531. [PDF]
- [11] Haibo Wang, Ning Zheng.Detecting Community Structure in Weighted Email Network.[C] Wuhan, China: IEEE Computer Society, 2009. [PDF] [RIS]