Author of the publication

CASFinder: Detecting Common Attack Surface.

, , , , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 338-358. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards 5G-ready Security Metrics., , , , , and . ICC, page 1-6. IEEE, (2021)Artificial Intelligence and Application in Finance.. IC4E, page 317-322. ACM, (2020)Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph., , , , , and . CloudCom, page 41-48. IEEE, (2020)VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation., , and . DBSec, volume 13942 of Lecture Notes in Computer Science, page 386-403. Springer, (2023)Impact of network effect and congestion effect on price competition among wireless service providers., , , and . CISS, page 523-528. IEEE, (2016)Privacy-Preserving Crowdsensing: Privacy Valuation, Network Effect, and Profit Maximization., , , and . GLOBECOM, page 1-6. IEEE, (2016)Privacy-Preserving Database Assisted Spectrum Access: A Socially-Aware Distributed Learning Approach., , , , and . GLOBECOM, page 1-6. IEEE, (2015)Chinese Implicit Binary complex Sentence Relation Recognition Based on RDAGCN Hybrid Model., , , , and . CCRIS, page 148-155. ACM, (2023)Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities., , , , , , and . CloudCom, page 167-174. IEEE, (2019)Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions., , , , , and . Comput. Secur., (2024)