计算机取证的相关法律技术问题研究 丁丽萍, 王永吉 软件学报 16 (2), 260-275, 2005 | 86 | 2005 |
Xenpump: a new method to mitigate timing channel in cloud computing J Wu, L Ding, Y Lin, N Min-Allah, Y Wang 2012 IEEE Fifth International Conference on Cloud Computing, 678-685, 2012 | 82 | 2012 |
Improving performance of network covert timing channel through Huffman coding J Wu, Y Wang, L Ding, X Liao Mathematical and Computer Modelling 55 (1-2), 69-79, 2012 | 74 | 2012 |
Identification and evaluation of sharing memory covert timing channel in Xen virtual machines JZ Wu, L Ding, Y Wang, W Han 2011 IEEE 4th International Conference on Cloud Computing, 283-291, 2011 | 54 | 2011 |
C2Detector: a covert channel detection framework in cloud computing J Wu, L Ding, Y Wu, N Min‐Allah, SU Khan, Y Wang Security and Communication Networks 7 (3), 544-557, 2014 | 52 | 2014 |
An droid 操作系统的安全性分析 丁丽萍 | 51 | 2012 |
Covert channel research 王永吉, 吴敬征, 曾海涛, 丁丽萍, 廖晓锋 Journal of Software 21 (9), 2262-2288, 2010 | 39 | 2010 |
隐蔽信道研究 王永吉, 吴敬征, 曾海涛, 丁丽萍, 廖晓锋 软件学报 21 (9), 2262-2288, 2010 | 39 | 2010 |
Secure machine learning, a brief overview X Liao, L Ding, Y Wang 2011 Fifth International Conference on Secure Software Integration and …, 2011 | 31 | 2011 |
Study on relevant law and technology issues about computer forensics 丁丽萍, 王永吉 Journal of Software 16 (2), 260-275, 2005 | 29 | 2005 |
VRank: a context-aware approach to vulnerability scoring and ranking in SOA J Jiang, L Ding, E Zhai, T Yu 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 21 | 2012 |
多维计算机取证模型研究 丁丽萍, 王永吉 计算机安全, 5-9, 2005 | 21 | 2005 |
论计算机取证的原则和步骤 丁丽萍 中国人民公安大学学报: 自然科学版 11 (1), 70-73, 2005 | 21 | 2005 |
Towards a reliable spam-proof tagging system E Zhai, L Ding, S Qing 2011 Fifth International Conference on Secure Software Integration and …, 2011 | 15 | 2011 |
Secguard: Secure and practical integrity protection model for operating systems E Zhai, Q Shen, Y Wang, T Yang, L Ding, S Qing Web Technologies and Applications: 13th Asia-Pacific Web Conference, APWeb …, 2011 | 14 | 2011 |
网络隐蔽信道关键技术研究综述 李彦峰, 丁丽萍, 吴敬征, 崔强, 刘雪花, 关贝, 王永吉 软件学报 30 (8), 2470-2490, 2019 | 13* | 2019 |
面向频繁模式挖掘的差分隐私保护研究综述 丁丽萍, 卢国庆 通信学报 35 (10), 2014 | 13 | 2014 |
Evaluation of the capability of personal software process based on data envelopment analysis L Ding, Q Yang, L Sun, J Tong, Y Wang Unifying the Software Process Spectrum: International Software Process …, 2006 | 13 | 2006 |
Robust and efficient covert channel communications in operating systems: design, implementation and evaluation Y Lin, L Ding, J Wu, Y Xie, Y Wang 2013 IEEE Seventh International Conference on Software Security and …, 2013 | 12 | 2013 |
A practical covert channel identification approach in source code based on directed information flow graph JZ Wu, L Ding, Y Wang, W Han 2011 Fifth International Conference on Secure Software Integration and …, 2011 | 11 | 2011 |