電子科技大學(xué)研究生導(dǎo)師名單
為你免費(fèi)答疑
關(guān)于《電子科技大學(xué)考研》我們搜集了部分電子科技大學(xué)考研真題和復(fù)試資源,免費(fèi)贈(zèng)送;并提供有償?shù)碾娮涌萍即髮W(xué)初試/復(fù)試/調(diào)劑輔導(dǎo)(收費(fèi)合理,內(nèi)部資源,效果有保障),如果需要領(lǐng)資源或了解研究生輔導(dǎo)的,請(qǐng)加網(wǎng)頁(yè)上的學(xué)姐微信。電子科技大學(xué)研究生導(dǎo)師名單來(lái)自電子科技大學(xué)研究生院網(wǎng)站,及歷年考研分?jǐn)?shù)線數(shù)據(jù)的匯總(學(xué)校網(wǎng)站一般不穩(wěn)定,或存留的分?jǐn)?shù)線年限較少)。以下即是電子科技大學(xué)歷年考研分?jǐn)?shù)線,希望對(duì)你的考研報(bào)考有用。
以下老師的信息來(lái)源于學(xué)校網(wǎng)站,如有錯(cuò)誤,可聯(lián)系我們進(jìn)行免費(fèi)更新或刪除。建議導(dǎo)師將更新的簡(jiǎn)歷尤其對(duì)研究生招生的要求發(fā)送給我們,以便考研學(xué)子了解導(dǎo)師的情況。(導(dǎo)師建議加QQ-1933508706,以便后續(xù)隨時(shí)更新網(wǎng)頁(yè)或發(fā)布調(diào)劑信息??佳信删W(wǎng)站和APP流量巨大)查看聯(lián)系方式>>。
電子科技大學(xué)研究生導(dǎo)師名單:(可用 Ctrl+F 進(jìn)行搜索)
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院導(dǎo)師介紹:周世杰
?個(gè)人簡(jiǎn)介
周世杰,教授
?聯(lián)系方式
電話:028-61830061
郵箱:johnsonzxs@uestc.edu.cn
?教育背景
2001.9---2004.6 電子科技大學(xué) 工學(xué)博士
1998.9―2001.4 電子科技大學(xué) 工學(xué)碩士
1991.9―1995.6 甘肅工業(yè)大學(xué) 工學(xué)學(xué)士
?研究項(xiàng)目
周世杰,P2P蠕蟲(chóng)傳播與抑制技術(shù)研究,國(guó)家自然科學(xué)基金, 2010-2013
周世杰,基于復(fù)雜網(wǎng)絡(luò)理論的P2P蠕蟲(chóng)模型研究,博士點(diǎn)基金,2008-2011
HoneyNet based Malcode and Malsoftware Measurement in Internet, Huawei Ltd., 2007-2008
周世杰,國(guó)家計(jì)算機(jī)網(wǎng)絡(luò)與信息安全管理中心242計(jì)劃項(xiàng)目:P2P網(wǎng)絡(luò)仿真, 2006-2007(課題編號(hào):2006B19)。
周世杰,華為高?;痦?xiàng)目:基于P2P的家庭網(wǎng)關(guān)互連模型及其標(biāo)準(zhǔn)研究,2006-2007(課題編號(hào):YJCB2006054BC)。
周世杰,電子科技大學(xué)青年博士學(xué)科平臺(tái)建設(shè)項(xiàng)目:對(duì)等計(jì)算實(shí)驗(yàn)室,33萬(wàn)元,2006~2007(課題編號(hào):05BS00602)。
周世杰,Cicso CCRP(國(guó)際合作項(xiàng)目):基于無(wú)線對(duì)等網(wǎng)絡(luò)的VoIP的數(shù)學(xué)模型研究,2005~2006(課題編號(hào):20033042)。
周世杰,電子科技大學(xué)引進(jìn)人才及優(yōu)秀畢業(yè)生科技啟動(dòng)基金項(xiàng)目:對(duì)等網(wǎng)絡(luò)中的分布式路由算法及其協(xié)議研究, 2004~2006。
周世杰,電子科技大學(xué)青年科技基金:基于對(duì)等網(wǎng)絡(luò)的密碼分析技術(shù),2004~2006(課題編號(hào):JX04029)。
申請(qǐng)者作為項(xiàng)目研發(fā)人員參與的相關(guān)科研項(xiàng)目
國(guó)家863計(jì)劃:垃圾郵件檢測(cè)控制關(guān)鍵技術(shù)(項(xiàng)目編號(hào):2006AA01Z411),2007-2009
科技部國(guó)家863引導(dǎo)計(jì)劃(863引導(dǎo)計(jì)劃)資助課題:網(wǎng)絡(luò)化系統(tǒng)容災(zāi)技術(shù)研究(課題編號(hào):2002AA001042)
四川省科技廳重點(diǎn)項(xiàng)目:網(wǎng)絡(luò)信息防護(hù)技術(shù)研究,2001年6月~2003年12月(課題編號(hào):01GG07-12)。
科技部國(guó)家高技術(shù)研究發(fā)展計(jì)劃(863計(jì)劃):戰(zhàn)略預(yù)警與監(jiān)管體系結(jié)構(gòu)研究,2002年9月~2003年12月,2003年1月通過(guò)驗(yàn)收(課題編號(hào):2002AA142040)。
國(guó)家計(jì)算機(jī)網(wǎng)絡(luò)與信息安全管理中心項(xiàng)目,垃圾郵件綜合舉報(bào)系統(tǒng),2005.12-2006.12(編目編號(hào):2005C58)。
綿陽(yáng)863軟件專(zhuān)業(yè)孵化器有限公司,基于網(wǎng)絡(luò)處理器技術(shù)的IPv6硬件防火墻,2005.1-2006.12(20041228008KD)。
計(jì)算機(jī)網(wǎng)絡(luò)與信息安全管理中心,宏觀網(wǎng)絡(luò)安全預(yù)警與應(yīng)急響應(yīng)系統(tǒng),2005.11-2006.11(2005A09)。
華為技術(shù)有限公司,基于P2P模式的垃圾郵件過(guò)濾系統(tǒng),2005.06-2006.06(YJCB2005006NP)。
中興通訊股份有限公司,通用移動(dòng)安全服務(wù)研究,2005.07-2006.08(HW05002)。
國(guó)家高新技術(shù)研究發(fā)展計(jì)劃計(jì)劃,入侵與防護(hù)技術(shù)實(shí)驗(yàn)室,2005.03-2005.12(2005AA145080)。
計(jì)算機(jī)網(wǎng)絡(luò)與信息安全管理中心,基于語(yǔ)義標(biāo)注的信息提取子系統(tǒng),2005.02-2005.0(005-實(shí)(分包)-007)。
四川省科技廳,基于兩方安全計(jì)算的新一代電子商務(wù)交易模型研究,2005.5-2006.12(05GG007-011-01)。
國(guó)家自然科學(xué)基金,對(duì)等網(wǎng)絡(luò)中的分布式路由技術(shù)研究,2005.1-2007.12(60473090)。
國(guó)家自然科學(xué)基金,基于泛洪的非結(jié)構(gòu)化P2P系統(tǒng)中分布式拒絕服務(wù)攻擊防范方法的研究,2006.1-2008.12(60573129)。
四川省科技廳,網(wǎng)絡(luò)化系統(tǒng)容災(zāi)技術(shù),2003-2004(03GG007-12)。
教育部博士點(diǎn)基金,基于ECC的高效安全多方計(jì)算協(xié)議研究,2006.1-2008.12(20050614018)。
?論文列表
1. Shijie Zhou, Zhen Zhang, Zongwei Luo, Edward C. Wong, CJ Tan,Lightweight Anti-desynchronization RFID Authentication Protocol, Journal of Information Systems Frontiers, 2009
2. Fagen Li, Shijie Zhou, and Rong Sun, Cryptanalysis of an identity based proxy multi-signature scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008.
3. Fagen Li, Chunxiang Xu, and Shijie Zhou. Improvement of a proactive threshold signcryption scheme. International Journal of Computers and Applications. 2008.
4. Wu Chunjiang, Shijie Zhou. Simulating the Epidemic of P2P Worms in BitTorrent Networks, Journal of Electronic Science and Technology, Vol.36, No.6, 2007
5. Lu Qin, Shijie Zhou. Analysis of P2P Traffic Identification, Journal of Electronic Science and Technology,Vol.36, No.6, 2007
6. Luo Zongwei, Shijie Zhou, Enhancement of a Lightweight RFID Security Protocol, Journal of Electronic Science and Technology, Vol.36, No.6, 2007
7. Wu Sinan, Shijie Zhou, Qin Zhiguang, The analysis about Near Field Communication Technology, Journal of Electronic Science and Technology,Vol.36, No.6, 2007
8. Shijie Zhou, Qin Zhiguang, Bidding Election: A Secure Solution, Journal of Information & Computational Science Vol.4, No.1, 2007
9. Shijie Zhou, Research on the distributed routing protocol and algorithm in P2P network, Journal of Electronic Science and Technology, Vol.3 No.2,2005
10. Shijie Zhou, Qin Zhiguang, a community based distributed routing algorithm in P2P network,Journal of computer Science, 2004,33(5):34~37.(In Chinese)
11. Shijie Zhou, Qin Zhiguang, a Basic Weak Fair Exchange Protocol for Resource in P2P Networks, Journal of Computer Science, 2004,33(7):.45~47. (In Chinese)
12. Shijie Zhou, Qin Zhiguang, P2P Based Distributed Key Management System, Journal of Computer research and development (2003)(In Chinese)
13. Shijie Zhou, Qin Zhiguang, Analyzing the Peer-to-Peer Computing Technology, Journal of Computer Application, 2003, Vol.23, No.10, P.4~7 (In Chinese)
14. Shijie Zhou, Qin Zhiguang, The Dependable Routing Rule in the Community Sensitive Distributed Routing Protocol for Peer-to-Peer Network, Journal of Computer Science, 2003. (In Chinese)
15. Shijie Zhou, Qin Zhiguang, a Multi-agents Based Effective Response System for Intrusion, Journal of University of Electronic Science and Technology,2003. (In Chinese)
16. Shijie Zhou, Qin Zhiguang, P2P-Based Information Storage Technology, Journal of Computer Research and development, 2003. (In Chinese)
17. Shijie Zhou, Qin Zhiguang, System Disaster Preventing Technology in Networking Environment: Survey and Implement, Journal of Computer Research and development, 2003. (In Chinese)
18. Shijie Zhou, Qin Zhiguang, Study on the Real-Time Software development, Journal of Microcomputer System, 2002. (In Chinese)
19. Shijie Zhou, Qin Zhiguang, The Queuing Model of the Message Oriented Middleware, Journal of Computer Science, 2001, Vol.29, No.2, p.84-86. (In Chinese)
20. Shijie Zhou, Qin Zhiguang, Study on Message Queuing Technology--- Overview and a Case Study, Journal of Computer Science, 2002,11, No.11. (In Chinese)
21. Shijie Zhou, Qin Zhiguang, Middleware Technology in Intelligent Transportation System, Journal of UESTC, 2002, Vol.31, No.2, P.168-172. (In Chinese)
CONFERENCE PAPER:
1. Zhen Zhang, Shijie Zhou, Luo Zongwei, Design and Analysis for RFID Authentication Protocol, The First International Workshop on Advances in RFID (AIR 2008), Xi’an, China, 2008 (Accept)
2. Rui Yang, Shijie Zhou, Chengyu Fan, A new algorithm for network diameter, The 9th International Conference for Young Computer Scientists, Zhang Jia Jie, China, 2008 (Accept)
3. Shijie Zhou, Zongwei Luo, Edward Wong, C.J. Tan, Jaiqing Luo, Interconnected RFID Reader Collision Model and its Application in Reader Anti-collision, IEEE 2007 RFID, Texas, USA, 2007
4. Wu Chunjiang, Shijie Zhou, Luo Jiaqing, Wei Ningna, A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems, ICA3PP, Hangzhou, China, 2007
5. Shijie Zhou, Qin Zhiguang, Bidding Election: A Secure Solution, International Symposium on Information and Computational Science '06, Dalian, China, 2006
6. Shijie Zhou, Interconnected Peer-to-Peer Network: A Community Based Scheme,ICIW,F(xiàn)rance,2006
7. Luo Jiaqing, Shijie Zhou, Adaptive Flooding Routing Algorithm in Unstructured P2P, in Proceedings of the IEEE ICCCAS06, Guilin,China,2006:P.1557-1561.
8. Luo Jiaqing, Shijie Zhou, An Experimental Study of The Active Recommendation Mechanism Based Distribution Approximate Indexing in Unstructured Peer-to-Peer Networks, The International IEEE Workshop P2PAA06, Hong Kong, China, 2006.
9. Shijie Zhou, Qin Zhiguang, Liu Jinde. Distributing the key into the P2P network, International workshop of Grid Computing (GCC2003), 2003, Springer-Verlag, LNCS, 2003.
10. Shijie Zhou, Qin zhiguang. Cost-based intrusion detection and response system: design and implementation, Proceedings of The Fourth International conference of on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003), Chengdu, China, August, 2003(Indexed By EI)
11. Shijie Zhou, Qin zhiguang. Color Petri Net based attack modeling, The 9th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing (RSFDGrC'2003), Chongqing, China,May 26-29, 2003
12. Shijie Zhou, Qin zhiguang. Cost-based Intelligent Intrusion and Response System, the Fifth International Conference on Algorithms and Architecture for Parallel Processing(ICA3PP 2002), Beijing, 2002
?所獲獎(jiǎng)勵(lì)
網(wǎng)絡(luò)信息防御系統(tǒng), 四川省科技進(jìn)步二等獎(jiǎng)(2007年)
計(jì)算機(jī)本科實(shí)踐教學(xué)體系研究, 四川省教學(xué)成果二等獎(jiǎng)(2008年)
信息安全專(zhuān)業(yè)本科人才培養(yǎng)體系改革與實(shí)踐, 電子科技大學(xué)教學(xué)成果二等獎(jiǎng)(2008年)
計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全技術(shù)四川省精品課程, 四川省教育廳(2008年)
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院導(dǎo)師介紹:張小松
?個(gè)人簡(jiǎn)介
張小松,教授
?聯(lián)系方式
電話:028-61830061
郵箱:johnsonzxs@uestc.edu.cn
?教育背景
1968年6月出生,四川雙流人,教授、博導(dǎo)。本科畢業(yè)于上海交通大學(xué),碩士、博士畢業(yè)于電子科大學(xué)。
*教育部長(zhǎng)江學(xué)者特聘教授;
*第十一批四川省學(xué)術(shù)技術(shù)帶頭人;
*國(guó)家科學(xué)技術(shù)獎(jiǎng)勵(lì)評(píng)審專(zhuān)家;
*保密通信國(guó)防重點(diǎn)實(shí)驗(yàn)室客座專(zhuān)家;
*國(guó)家信息技術(shù)安全研究中心-電子科技大學(xué)網(wǎng)絡(luò)安全技術(shù)實(shí)驗(yàn)室主任;
*電子科技大學(xué)大數(shù)據(jù)研究中心副主任兼安全大數(shù)據(jù)研究所所長(zhǎng)。
?科研方向
長(zhǎng)期致力于網(wǎng)絡(luò)與信息安全、計(jì)算機(jī)應(yīng)用技術(shù)的研究和人才培養(yǎng),重點(diǎn)圍繞網(wǎng)絡(luò)空間安全中,IT基礎(chǔ)架構(gòu)、大數(shù)據(jù)安全及應(yīng)用、嵌入式平臺(tái)安全、網(wǎng)絡(luò)攻擊檢測(cè)與軟件脆弱性等關(guān)鍵領(lǐng)域和支撐技術(shù)開(kāi)展創(chuàng)新研究和技術(shù)攻關(guān),近來(lái)主要興趣和方向包括:
1、軟件安全性分析;
2、大數(shù)據(jù)環(huán)境下的網(wǎng)絡(luò)信息安全;
3、自主可控的安全虛擬化基礎(chǔ)架構(gòu)關(guān)鍵技術(shù)及產(chǎn)業(yè)推廣應(yīng)用;
4、可信安全嵌入式系統(tǒng);
5、復(fù)雜電磁環(huán)境多目標(biāo)優(yōu)化(智能航路規(guī)劃,信號(hào)最優(yōu)化覆蓋)
?研究項(xiàng)目
自2006年建立網(wǎng)絡(luò)技術(shù)實(shí)驗(yàn)室起,領(lǐng)導(dǎo)團(tuán)隊(duì)圍繞網(wǎng)絡(luò)空間安全的國(guó)家戰(zhàn)略及科學(xué)問(wèn)題,系統(tǒng)開(kāi)展方法、理論研究以及關(guān)鍵技術(shù)攻關(guān),截至2014年底,主持承擔(dān)包括軍973課題、863重點(diǎn)課題、國(guó)防預(yù)研課題、型號(hào)課題、省部科技支撐課題、企業(yè)橫向合作課題50多項(xiàng),主持研制的網(wǎng)絡(luò)和信息化平臺(tái)在應(yīng)用中取得重要的社會(huì)和經(jīng)濟(jì)效益,近年來(lái)分別獲得:
2012年度中華人民共和國(guó)科學(xué)技術(shù)進(jìn)步二等獎(jiǎng)(第1完成人)
2013年度四川省科技進(jìn)步一等獎(jiǎng)(第2完成人)
2010年度四川省科技進(jìn)步一等獎(jiǎng)(第1完成人)
2008年度四川省科技進(jìn)步二等獎(jiǎng)(第1完成人)
2013電力行業(yè)信息化優(yōu)秀成果一等獎(jiǎng)(第3完成人)
?論文列表
截至2015年,在研究領(lǐng)域重要學(xué)術(shù)期刊上發(fā)表SCI、EI收錄論文36篇(SCI收錄13篇,其中ISI JCR一區(qū)論文6篇),獲授權(quán)發(fā)明專(zhuān)利8項(xiàng),受理及公開(kāi)26項(xiàng),獲計(jì)算機(jī)軟件著作權(quán)登記10項(xiàng)。主要論文如下:
[1] Yong Yu,Jianbing Ni,Qi Xia,Xiaofen Wang, Haomiao Yang, Xiaosong Zhang.SDIVIP2: Shared Data Integrity Verification with Identity Privacy Preserving in Mobile Clouds.Concurrency and Computation: Practice and Experience(Accepted):
[2] Ting Chen, Xiao-song Zhang, Xiao-li Ji, Cong Zhu, Yue Wu. Test Generation for Embedded Executables via Concolic Execution in Real Environment. IEEE Transactions on Reliability, 2014. (SCI,IF 2.293, Accepted)
[3] Ting Chen, Xiao-song Zhang, Cong Zhu, Xiao-li Ji, Shi-ze Guo, Yue Wu. Design and Implementation of a Dynamic Symbolic Execution Tool for Windows Executables. Journal of Software: Evolution and Process. 2013, 25:1249-1272. (SCI,IF 1.273, CCF推薦B類(lèi)刊物)
[4] Ting Chen, Xiao-song Zhang, Shi-ze Guo, Hong-yuan Li, Yue Wu. State of the art: Dynamic symbolic execution for automated test generation. Future Generation Computer Systems, 2013, 29(7): 1758-1773. (SCI,IF 1.864)
[5] Ting Chen, Xiao-song Zhang, Yue Wu. FPM: Four-factors Propagation Model for Passive P2P Worms. Future Generation Computer Systems, 2014,36(7): 133-141(SCI,IF 1.864)
[6] Ting Chen, Xiao-song Zhang*, Hong-yuan Li, Dong Wang, Yue Wu. Propagation Modeling of Active P2P Worms Based on Ternary Matrix. Journal of Network and Computer Applications, 2013, 36(5):1387-1394. (SCI,IF1.467)
[7] Ting Chen, Xiao-song Zhang, Hua Li, Xiong-da Li, Yue Wu. Fast Quarantining of Proactive Worms in Unstructured P2P Networks. Journal of Network and Computer Applications, 2011, 34:1648-1659. (SCI,IF1.467)
[8] Ying SUN,Yong Yu,Xiaosong Zhang*,Jiwen CHAI.On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model.IEICE TRANS.FUNDAMENTALS,VOL.E96-A,NO.3 MARCH 2013:721-723(SCI,EI檢索)
[9] Ting CHEN,Xiao-song ZHANG,XU XIAO,YUE WU,Chun-xiang XU.SEVE: Symbolic Execution based Vulnerability Exploring System[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2013,32(2):620-637(SCI:03321641311297016,IF0.373,EI:20131216126668)
[10] Zhi LIU, Xiao-song ZHANG, Yue, WU, Ting CHEN.An Effecitve Taint-based Software Vulnerability Miner.[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2013,32(2):467-484 (SCI:03321641311296873,IF0.373,EI:20131216126677)
[11] Xiao-song ZHANG, Ting CHEN, Chun-xiang XU, Xiao-hui PAN.Proactive P2P Worm Containment via Automatic Authentication.[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2013,32(2): 1163-1170(SCI:03321641311297106,IF0.373,EI:20131216126671)
[12] Zhang Xiaosong, Chen Ting, Chen Dapeng, Liu Zhi. SISG: self-immune automated signature generation for polymorphic worms[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2010,29(2): 445 - 467 (SCI:592IH, EI:20101312803311,IF 0.373)
[13] Zhang Xiaosong,Chen Ting,Zheng Jiong,Li Hua.Proactive worm propagation modeling and analysis in unstructured peer-to-peer Networks[J]. Journal of Zhejinang University-SCIENCE C,2010,11(2):119-129 (SCI:568QQ,EI:20101912914212,IF 0.373)
[14] Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao. Designated verifier proxy signature scheme without random oracles[J]. Computers and Mathematics with Applications, May.2009 ,57 (4): 1352-1364(SCI, EI )
[15] Xiaoli Ji, Xiaosong Zhang, Ting Chen, Xiaoshan Li and Lei Jiang. Loop Transparency for Scalable Dynamic Symbolic Execution [J]. Advances in Engineering Design and Optimization Ⅲ, 2012, Applied Mechanics and Materials Vols.201-202,Part 1: 242-245
[16] Weiwei Wang,Xiaosong ZHANG,Ting Chen,Xueyang Wu,Xiaoshan Li.The Cloud Computing Based Software Testing Framework Design and Implementation[J]. Advances in Computer, Communication, Control and Automation, 2011, LNEE(121): 785-790 (EI: 20114814569195)
[17] Xiaowei Yan,Xiaosong ZHANG,Ting Chen,Hongtian Zhao,Xiaoshan Li. The research and design of cloud computing security framework[J]. Advances in Computer, Communication, Control and Automation, 2011, LNEE(121): 757-763 (EI: 20114814569191)
[18] Xiao-song ZHANG,Jiong Zheng,Hua Li.A Novel Approach for Host General Risk Assessment Based on Logical Recursion[J]. Electronics and Signal Processing, 2011, LNEE(1): 469-475 (EI: 20113214223771)
[19] Zhang, Xiao-Song, Chen, Ting, Wang, Xiao-Lin, Huang, Yong, Bao, Hou-Bin. CRBA: A capacity restricted model evolved from BA model for complex network.[J]. Journal of Networks,2011,6(8): 1163-1170 (EI: 20113314243427)
[20] Zhi Liu, Xiaosong Zhang,Xiongda Li.Proactive Vulnerability Finding via Information Flow Tracking[C]. Nanjing, Jiangsu, China:MINES 2010:481-485(EI:20110413613499)
[21] Xiao-song Zhang, Jiong Zheng, Ji-wei Zou. A Simplified Model for Attack Paths Contruction in Multiple Hosts[C]. Harbin, China:PCSPA-2010:301-304(EI:20105213521161)
[22] Xu Xiao, Xiao-song Zhang,Xiong-da Li. New Approach to Path Explosion Problem of Symbolic Execution [C]. Harbin, China:PCSPA-2010:1310-1313(EI:20105213521014)
[23] Jiong Zheng,Xiao-song Zhang,Xiao-hui Pan. A Host Deployed Vulnerability Assessment System Based On OVAL[C]. Taiyuan,China: ICCASM 2010:V2-123-126(EI:20104913451889)
[24] Zhang Xiaosong, Chen Ting, Chen Ruidong,Li Hua.Complex Network Modeling with Constant Capacity Restriction Based on BA Model[C]. Wuhan, China:CNMT 2009:315-318(EI:20101212778932)
[25] Li Hua, Qin Zheng,Pan Xiaohui,Zhang Xiaosong.Propagation Model of Non-scanning Active Worm in Unstructured P2P Network. Wuhan,China:MINES 2009:378-381(EI:20101012757931)
[26] Zhang Xiaosong,Liu Fei,Chen Ting,Li Hua. Research and Application of the Transparent Data Encryption in Intranet Data Leakage Prevention. BeiJing,China:CIS'2009:376-379(EI:20101112768893)
[27] Zhang Xiaosong,Chen Ting, MaYue,LiHua.Peer-to-Peer Based Intrusion Detection Modelling and Analysis. Beijing, China:ICFIN 2009:213-217(EI:20095212570233)
[28] Zhang Xiaosong,Pan Xiaohui,Long Xiaoshu. Analysis of Virtual Machine applied to Malware Detection System[C]. Wuhan, China: IEEC'2009:290-294(EI:20094712465399)
[29] Liu Zhi, Xiaosong Zhang. A Novel Approach to Malicious Executables Detection and Containment Based on Distributed System Architecture[C]. Jinan, China:ICNC'2008:160-164 (EI:20085211803927)(ISTP:BJB64)
[30] Zhang Xiaosong, Chen Ting,Wang Ding. A Novel Model for Critical Services Consolidation based on FVM. [C]. Wuhan, China: EBISS'2009:77-81(EI:20094212376970) (EI:20094212376970)(ISTP:BLZ43)
[31] Da-Peng Chen, Xiao-song Zhang. Internet Anomaly Detection with Weighted Fuzzy Matching over Frequent Episode Rules[C]. Chengdu,China:ICACIA 2008:299-302(EI:20092412118490)(ISTP:BJX45)
[32] Xiao-song Zhang,Lin Shao, Jiong Zheng. A novel method of software vulnerability detection based on fuzzing technique[C]. Chengdu,China:ICACIA 2008:270-273(EI:20092412118483)(ISTP:BJX45)
[33] Xiao-song Zhang, Liu Zhi,Da-Peng Chen. A practical taint-based malware detection[C]. Chengdu,China:ICACIA 2008:73-77(EI:20092412118436)(ISTP:BJX45)
[34] Ting Chen, Zhang Xiaosong,Liu Zhi. A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes[C]. Wuhan, China: EBISS'2009:45-49(EI:20094212376957)(ISTP:BLZ43)
[35] Xiaohui Pan,Zhang Xiaosong, Ting Chen. A Novel Hybrid Method for Polymorphic Worm Detection[C]. Wuhan, China: EBISS'2009:50-54(EI:20094212376968)(ISTP:BLZ43)
[36] Xiao-song Zhang,Lei Huang,Chun-xiang Xu,Ting Chen.A Novel Method for Host Risk Assessment Based on Predecessor Attack[C]. Changsha, China:ICSIP 2010:495-498(EI:20114214443499)
[37] Zhang Xiaosong,Chen Ting,Zheng Jiong,Li Hua.Active Worm Propagation Modeling in Unstructured P2P Networks[C]. Huangshan, China: ISCSCT’09:35-38(EI: 20101912914212)
[38] 劉智,張小松.一種基于污點(diǎn)分析的文件型軟件漏洞發(fā)現(xiàn)方法.小型微型計(jì)算機(jī)系統(tǒng),2012,33(1): 42-48
[39] 劉智,張小松, 吳躍. 一種有效的Return-Oriented-Programming攻擊檢測(cè)方法.小型微型計(jì)算機(jī)系統(tǒng),2013,34(7):
?教學(xué)工作
(1)從教以來(lái),先后為計(jì)算機(jī)應(yīng)用技術(shù)和信息安全專(zhuān)業(yè)本科生講授基礎(chǔ)核心課程《微機(jī)原理與接口技術(shù)》、《數(shù)字邏輯設(shè)計(jì)》、《信息安全概論》和《網(wǎng)絡(luò)安全協(xié)議》,開(kāi)設(shè)本科公選課程《網(wǎng)絡(luò)安全與信息對(duì)抗》;
(2) 主編普通高等學(xué)校信息安全“十一五”規(guī)劃教材《網(wǎng)絡(luò)安全協(xié)議》,參編普通高等教育“十一五”國(guó)家級(jí)規(guī)劃教材《計(jì)算機(jī)組成原理與匯編語(yǔ)言程序設(shè)計(jì)(第二 版)》,主持翻譯《軟件測(cè)試(第二版)》、《計(jì)算機(jī)安全學(xué)(第二版)》譯著教材;
(3) 作為負(fù)責(zé)人參與2007四川省精品課程《信息安全概論》建設(shè)(排名第三);
(4) 2007年創(chuàng)立本科“凝聚網(wǎng)絡(luò)安全技術(shù)工作室”,指導(dǎo)學(xué)生參加2008、2010、2013全國(guó)大學(xué)生信息安全競(jìng)賽,獲二等獎(jiǎng)、三等獎(jiǎng)多項(xiàng)。
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院李發(fā)根導(dǎo)師介紹
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院劉念伯導(dǎo)師介紹
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院宋超導(dǎo)師介紹
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院王曉敏導(dǎo)師介紹
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院夏琦導(dǎo)師介紹
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院楊浩淼導(dǎo)師介紹
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院禹勇導(dǎo)師介紹
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院郭迅導(dǎo)師介紹
電子科技大學(xué)
添加電子科技大學(xué)學(xué)姐微信,或微信搜索公眾號(hào)“考研派小站”,關(guān)注【考研派小站】微信公眾號(hào),在考研派小站微信號(hào)輸入【電子科技大學(xué)考研分?jǐn)?shù)線、電子科技大學(xué)報(bào)錄比、電子科技大學(xué)考研群、電子科技大學(xué)學(xué)姐微信、電子科技大學(xué)考研真題、電子科技大學(xué)專(zhuān)業(yè)目錄、電子科技大學(xué)排名、電子科技大學(xué)保研、電子科技大學(xué)公眾號(hào)、電子科技大學(xué)研究生招生)】即可在手機(jī)上查看相對(duì)應(yīng)電子科技大學(xué)考研信息或資源。