Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification

    Currently, malware is continually evolving and growing in complexity, posing a significant threat to network security. With the constant emergence of new types and quantities of malware coupled with the contin...

    Yifan Zhou, Zhenyan Liu, **gfeng Xue in Applied Cryptography and Network Security … (2024)

  2. No Access

    Chapter and Conference Paper

    Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis

    At present, APT attack detection has become the focus of the network security protection field. APT attacks are one of the most difficult attacks in cyber attacks. The complexity and variability of APT attack ...

    Yan Cui, **gfeng Xue, Yong Wang, Zhenyan Liu in Trusted Computing and Information Security (2019)

  3. No Access

    Chapter and Conference Paper

    Machine Learning for Analyzing Malware

    The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwares are endless and spread faster and become one of the mai...

    Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng in Network and System Security (2017)

  4. No Access

    Chapter and Conference Paper

    An Approach of Implementing Core Role Based Access Control Model Using Attribute Based Encryption

    Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is se...

    Yong Wang, Xuemin Tong, Ming Li, **gfeng Xue in Trusted Computing and Information Security (2017)