
- 教师名称:李晓红
- 教师拼音名称:XiaoHong Li
- 性别:女
- 职务:Dean of Computer and Information Technology Dept.
- 职称:教授
-
56. Yan B, Li X, Du Z. A Threat Model-Driven Security Testing Approach for Web Application[J]. Communications in Computer & Information Science, 2013, 332:158-168. (EI 20132616453466). 2017
-
55. Zhang Q, Li X, Yu X, et al. ASF: Improving Android Security with Layered Structure Instrumentation[M]// Contemporary Research on E-business Technology and Strategy. Springer Berlin Heidelberg, 2012:147-157. (EI 20132616453465). 2017
-
54. Yu X, Li X, Zhang Q. Eliciting Security Requirements Method Based on Safety Knowledge Base[M]// Contemporary Research on E-business Technology and Strategy. Springer Berlin Heidelberg, 2012:109-121. (EI 20132616453462). 2017
-
53. Liu Y, Du Z, Shi H, X Li. A Screening Method of Security Functional Components Based on Fuzzy[J]. Communications in Computer & Information Science, 2012, 332:292-305. (EI 20132616453479). 2017
-
52. Wang Q, Li X, Yan B. A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis[M]// Contemporary Research on E-business Technology and Strategy. Springer Berlin Heidelberg, 2012:259-270. (EI 20132616453476). 2017
-
51. 李晓红, 冯志勇. 浏览器扩展行为监控系统的设计与实现[J]. 计算机应用研究, 2012, 29(1):191-196.. 2017
-
50. Junjie Wang, Xiaohong Li, Qin Wang,GuangQuan Xu, Characteristic Behavior Sequence Based Attack Detection Method for Browser Extension (ACSA-Summer 2012. SI of Journal of "INFORMATION".SCI 4). 2017
-
49. Wang J, Li X, Liu X, et al. An empirical study of dangerous behaviors in firefox extensions[C]// International Conference on Information Security. Springer-Verlag, 2012:188-203. (EI:20124115538466). 2017
-
48. Han Z, Li X, Liu Y, et al. Auto-Selection of Security Functional Components Based on Common Criteria[J]. International Journal of Digital Content Technology & Its Applications, 2012, 6(1):479-487. (EI 20120714765735). 2017
-
47. Xie X, Li X, Cao K, et al. Security Modeling Based on CSP for Network Protocol[J]. International Journal of Digital Content Technology & Its Applications, 2012, 6(1):496-504. (EI 20120714765737). 2017
-
46. Wang J, Li X, Yan B, et al. Pointer Analysis Based Vulnerability Detection for Browser Extension[J]. International Journal of Digital Content Technology & Its Applications, 2012, 6(1):488-495. ( EI 20120714765736). 2017
-
45. Luu A T, Sun J, Liu Y, et al. SeVe: automatic tool for verification of security protocols[J]. Frontiers of Computer Science, 2012, 6(1):57-75.(SCI 4)(UT WOS 000299768800005). 2017
-
44. Li X H, Hu C, Feng Z Y, et al. An Approach to Obtain Software Security Vulnerabilities Based on Vertical Search[J]. Advanced Materials Research, 2012, 403-408:3203-3206.. 2017
-
43. 何可, 李晓红, 冯志勇,等. 基于攻击场景的安全测试生成方法[J]. 天津大学学报(自然科学与工程技术版), 2011, 44(4):344-352. (EI20112013990802). 2017
-
42. Ke H E, Xiao-Hong L I, Feng Z Y, et al. Attack Scenario Based Approach to Security Test Generation[J]. Journal of Tianjin University, 2011, 44(4):344-352. (EI2011201399080).. 2017