
- 教师名称:李晓红
- 教师拼音名称:XiaoHong Li
- 性别:女
- 职务:Dean of Computer and Information Technology Dept.
- 职称:教授
-
71. 杜长霄, 李晓红, 石红, 等. J2EE 应用软件的架构安全评估方法[J]. 计算机科学与探索, 2014, 8(5): 572-581.. 2017
-
70. Jiao H, Li X, Zhang L, et al. Hybrid detection using permission analysis for Android malware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2014: 541-545. CCF C类. 2017
-
69. Pei H, Li X, Xu G, et al. Mining Specification of Insecure Browser Extension Behavior[C]//Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. IEEE, 2014: 871-876. CCF C类. 2017
-
68. Zhao S, Li X, Xu G, et al. Attack tree based android malware detection with hybrid analysis[C]//Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. IEEE, 2014: 380-387. CCF C类. 2017
-
67. Han, Z., Li, X., Feng, R., Hu, J., Xu, G., & Feng, Z. (2014, September). A Three-Dimensional Model for Software Security Evaluation. In Theoretical Aspects of Software Engineering Conference (TASE), 2014 (pp. 34-41). IEEE. CCF C类.. 2017
-
66. Wu X, Li X, Feng R, et al. OOPN-SRAM: A Novel Method for Software Risk Assessment[C]// International Conference on Engineering of Complex Computer Systems. IEEE, 2014:150-153. CCF C类(EI 201445163799). 2017
-
65. Shen G, Li X, Feng R, et al. An Extended UML Method for the Verification of Security Protocols[C]// International Conference on Engineering of Complex Computer Systems. IEEE, 2014:19-28. CCF C类(EI 201445163783).. 2017
-
64. Li X, Li X, Xu G, et al. Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol[J]. Journal of Applied Mathematics,2014,(2014-6-17), 2014, 2014(2014):1-10. (SSCI 三区).(UT WOS 000338085600001). 2017
-
63. Zhang C, Li X, Hu J, et al. Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols[J]. Journal of Applied Mathematics,2014,(2014-6-1), 2014, 2014(7):1-10. (SSCI 三区).(UT WOS 000337377800001). 2017
-
62. Xie X, Li X, Liu Y, et al. Automatic Verification for Later-Correspondence of Security Protocols[C]// International Workshop on Structured Object-Oriented Formal Language and Method. Springer, Cham, 2014:111-126.. 2017
-
61. Li X H, He K, Feng Z, et al. Unified threat model for analyzing and evaluating software threats[J]. Security & Communication Networks, 2014, 7(10):1454-1466. (SCI四区). 2017
-
60. 刘月朋, 李晓红,石红,冯志勇.Android平台下基于联网行为的软件安全检测方法. 第十二届全国软件与应用学术会议(NASAC2013), 2013.(已录用). 2017
-
59. Chen, M., Tan, T. H., Sun, J., Liu, Y., Pang, J., & Li, X. (2013, October). Verification of functional and non-functional requirements of web service composition. In International Conference on Formal Engineering Methods (pp. 313-328). Springer, Berlin, Heidelberg. (EI 20135017078295). 2017
-
58. Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[M]// Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013:154-165.. 2017
-
57. Du C, Li X, Shi H, et al. Architecture Security Evaluation Method Based on Security of the Components[C]// Software Engineering Conference. IEEE, 2013:523-528. . 2017