Research and development of botnets J Zhuge, X Han, Y Zhou, Z Ye, W Zou Journal of Software 19 (3), 2008 | 182* | 2008 |
Studying malicious websites and the underground economy on the Chinese web J Zhuge, T Holz, C Song, J Guo, X Han, W Zou Managing information risk and the economics of security, 225-244, 2009 | 167 | 2009 |
Characterizing the irc-based botnet phenomenon J Zhuge, T Holz, X Han, J Guo, W Zou None, 2007 | 103 | 2007 |
Collecting autonomous spreading malware using high-interaction honeypots J Zhuge, T Holz, X Han, C Song, W Zou International Conference on Information and Communications Security, 438-451, 2007 | 93 | 2007 |
IntentFuzzer: detecting capability leaks of android applications K Yang, J Zhuge, Y Wang, L Zhou, H Duan Proceedings of the 9th ACM symposium on Information, computer and ¡¦, 2014 | 91 | 2014 |
A network anomaly detector based on the DS evidence theory JW ZHUGE, DW WANG, Y Chen, ZY YE, W ZOU Journal of software 17 (3), 463-471, 2006 | 81* | 2006 |
Research on botnet mechanisms and defenses J Jiang, JW Zhuge, HX Duan, JP Wu Ruanjian Xuebao/Journal of Software 23 (1), 82-96, 2012 | 69* | 2012 |
WebPatrol: Automated collection and replay of web-based malware scenarios KZ Chen, G Gu, J Zhuge, J Nazario, X Han Proceedings of the 6th ACM Symposium on Information, Computer and ¡¦, 2011 | 56 | 2011 |
De-‐obfuscation and Detection of Malicious PDF Files with High Accuracy X Lu, T Cyberspace, J Zhuge, R Wang, Y Cao, Y Chen HICSS¡®46, 2013 | 55 | 2013 |
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007 | 48* | 2007 |
Honeypot technology research and application JW Zhuge, Y Tang, XH Han, HX Duan Ruanjian Xuebao/Journal of Software 24 (4), 825-842, 2013 | 42* | 2013 |
Study on BGP security S Li, JW Zhuge, X Li Ruanjian Xuebao/Journal of Software 24 (1), 121-138, 2013 | 37* | 2013 |
A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices M Yu, J Zhuge, M Cao, Z Shi, L Jiang Future Internet 12 (2), 27, 2020 | 34 | 2020 |
Research on Classification of Attack Technologies J ZHUGE, Z YE, W ZOU Computer Engineering 21, 121-123, 2005 | 33* | 2005 |
Network attack plan recognition algorithm based on the extended goal graph JW Zhuge, XH Han, ZY Ye, W Zou Chinese Journal of Computers 29 (8), 1356-1366, 2006 | 32* | 2006 |
JShield: Towards real-time and vulnerability-based detection of polluted drive-by download attacks Y Cao, X Pan, Y Chen, J Zhuge Proceedings of the 30th Annual Computer Security Applications Conference ¡¦, 2014 | 27 | 2014 |
Preventing drive-by download via inter-module communication monitoring C Song, J Zhuge, X Han, Z Ye Proceedings of the 5th ACM symposium on information, computer and ¡¦, 2010 | 26 | 2010 |
{FANS}: Fuzzing Android Native System Services via Automated Interface Analysis B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge 29th USENIX Security Symposium (USENIX Security 20), 307-323, 2020 | 24 | 2020 |
僵ã¹网络îÜ发现与跟ñ¡ 诸ÊçËï伟£¬ 韩ãýû´£¬ 叶ò¤远£¬ 邹维 îï国网络与ãáãÓäÌîïÐü术研讨会, 2005 | 24* | 2005 |
Security mechanisms for wireless home network J Zhuge, R Yao GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No ¡¦, 2003 | 21 | 2003 |