Research and development of botnets J Zhuge, X Han, Y Zhou, Z Ye, W Zou Journal of Software 19 (3), 2008 | 186* | 2008 |
Studying malicious websites and the underground economy on the Chinese web J Zhuge, T Holz, C Song, J Guo, X Han, W Zou Managing information risk and the economics of security, 225-244, 2009 | 177 | 2009 |
Characterizing the irc-based botnet phenomenon J Zhuge, T Holz, X Han, J Guo, W Zou None, 2007 | 106 | 2007 |
Collecting autonomous spreading malware using high-interaction honeypots J Zhuge, T Holz, X Han, C Song, W Zou Information and Communications Security: 9th International Conference, ICICS …, 2007 | 103 | 2007 |
IntentFuzzer: detecting capability leaks of android applications K Yang, J Zhuge, Y Wang, L Zhou, H Duan Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 101 | 2014 |
A network anomaly detector based on the DS evidence theory JW ZHUGE, DW WANG, Y Chen, ZY YE, W ZOU Journal of software 17 (3), 463-471, 2006 | 81* | 2006 |
Research on botnet mechanisms and defenses 江健, 诸葛建伟, 段海新, 吴建平 Journal of Software 23 (1), 82-96, 2012 | 74* | 2012 |
A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices M Yu, J Zhuge, M Cao, Z Shi, L Jiang Future Internet 12 (2), 27, 2020 | 73 | 2020 |
De-‐obfuscation and Detection of Malicious PDF Files with High Accuracy X Lu, T Cyberspace, J Zhuge, R Wang, Y Cao, Y Chen HICSS‘46, 2013 | 65 | 2013 |
WebPatrol: Automated collection and replay of web-based malware scenarios KZ Chen, G Gu, J Zhuge, J Nazario, X Han Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 64 | 2011 |
Honeypot technology research and application 诸葛建伟, 唐勇, 韩心慧, 段海新 Journal of Software 24 (4), 825-842, 2013 | 51* | 2013 |
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007 | 50* | 2007 |
{FANS}: Fuzzing android native system services via automated interface analysis B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge 29th USENIX Security Symposium (USENIX Security 20), 307-323, 2020 | 47 | 2020 |
Study on BGP security S Li, JW Zhuge, X Li Ruanjian Xuebao/Journal of Software 24 (1), 121-138, 2013 | 47* | 2013 |
Jtrans: Jump-aware transformer for binary code similarity detection H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 40 | 2022 |
JShield: Towards real-time and vulnerability-based detection of polluted drive-by download attacks Y Cao, X Pan, Y Chen, J Zhuge Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 33 | 2014 |
Network attack plan recognition algorithm based on the extended goal graph JW Zhuge, XH Han, ZY Ye, W Zou Chinese Journal of Computers 29 (8), 1356-1366, 2006 | 32* | 2006 |
Research on Classification of Attack Technologies J ZHUGE, Z YE, W ZOU Computer Engineering 21, 121-123, 2005 | 32* | 2005 |
Preventing drive-by download via inter-module communication monitoring C Song, J Zhuge, X Han, Z Ye Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 27 | 2010 |
僵尸网络的发现与跟踪 诸葛建伟, 韩心慧, 叶志远, 邹维 全国网络与信息安全技术研讨会, 2005 | 25* | 2005 |