A survey on internet of things security from data perspectives J Hou, L Qu, W Shi Computer Networks 148, 295-306, 2019 | 130 | 2019 |
A Survey on Digital Forensics in Internet of Things J Hou, Y Li, J Yu, W Shi IEEE Internet of Things Journal 7 (1), 1-15, 2019 | 84 | 2019 |
Detecting Node. js prototype pollution vulnerabilities via object lookup analysis S Li, M Kang, J Hou, Y Cao Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 47 | 2021 |
Mining node. js vulnerabilities via object dependence graph and query S Li, M Kang, J Hou, Y Cao 31st USENIX Security Symposium (USENIX Security 22), 143-160, 2022 | 38 | 2022 |
An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention H Anu, J Chen, W Shi, J Hou, B Liang, B Qin 2019 IEEE International Conference on Software Maintenance and Evolution …, 2019 | 24 | 2019 |
Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity L Qu, C Wang, R Xiao, J Hou, W Shi, B Liang Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing …, 2019 | 16 | 2019 |
On the fine-grained fingerprinting threat to software-defined networks J Hou, M Zhang, Z Zhang, W Shi, B Qin, B Liang Future Generation Computer Systems 107, 485-497, 2020 | 13 | 2020 |
Fine-grained fingerprinting threats to software-defined networks M Zhang, J Hou, Z Zhang, W Shi, B Qin, B Liang 2017 IEEE Trustcom/BigDataSE/ICESS, 128-135, 2017 | 12 | 2017 |
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node. js Taint-style Vulnerability M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao 2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023 | 9 | 2023 |
DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN J Hou, Z Zhang, W Shi, B Qin, L Bin International Conference on Information and Communications Security, 503-520, 2019 | 1 | 2019 |