Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

5 results
Image document

Architecture of Network Environment for High-Risk Security Experimentation

Xiaohui Kuang , Xiang Li , Jinjing Zhao
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.479-484, ⟨10.1007/978-3-642-36818-9_53⟩
Conference papers hal-01480206v1
Image document

A Test Case Generation Technique for VMM Fuzzing

Xiaoxia Sun , Hua Chen , Jinjing Zhao , Minhuan Huang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.318-323, ⟨10.1007/978-3-642-36818-9_34⟩
Conference papers hal-01480188v1
Image document

H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation

Jinjing Zhao , Yan Wen , Gang Zhao
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.32-43, ⟨10.1007/978-3-642-24403-2_3⟩
Conference papers hal-01593032v1
Image document

SA4WSs: A Security Architecture for Web Services

Lingxia Liu , Dongxia Wang , Jinjing Zhao , Minhuan Huang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, ⟨10.1007/978-3-642-36818-9_32⟩
Conference papers hal-01480186v1
Image document

Emulation on the Internet Prefix Hijacking Attack Impaction

Jinjing Zhao , Yan Wen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers hal-01480207v1