- 81. Geng S, Li X, Feng Z, et al. Web Application Architecture Security Evaluation Method Based on AADL[C]// International Conference on Engineering of Complex Computer Systems. IEEE, 2016:186-189. (CCF C类会议). Gold Coast, Australia, 2015/12/9—2015/12/11.2017
- 80. Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. Software Engineering IEEE Transactions on, 2015, 41(1):3-18..2017
- 79. Guo Q, Li X, Feng Z, et al. MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks[C]// IEEE, International Conference on High PERFORMANCE Computing and Communications. IEEE, 2015:1512-1517..2017
- 78. Song J, Li X, Hu J, et al. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor[C]// IEEE Trustcom/bigdatase/ispa. IEEE Computer Society, 2015:33-40. (CCF C类会议). Helsinki, Finland, 2015/8/20-2015/8/22..2017
- 77. Tian D, Li X, Hu J, et al. POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware[M]// Security and Privacy in Communication Networks. Springer International Publishing, 2015. (CCF C类会议). DALLAS, UNITED STATES. 2015/10/26-2015/10/29.2017
- 76. Han Z, Rineau M, Gauthier F, et al. Evolutionary analysis of access control models: a formal concept analysis method[C]// International Conference on Computer Science and Software Engineering. IBM Corp. 2015:261-264. (CCF C类会议). Markham, Ontario, Canada, 2015/11/2—2015/11/14.2017
- 75. Han Z, Li X, Stroulia E. A Hierarchical Security-Auditing Methodology for Cloud Computing[C]// IEEE International Conference on Services Computing. IEEE, 2015:202-209. (CCF C类会议). USA, New York , 2015/6/27—2015/7/2..2017
- 74. Keman Huang(#)(*), Zhiyong Feng, Jianqiang Li, Xiaohong Li, System thinking of the Software Vulnerability Market via Complex Network Theory, IEEE Symposium on Security and Privacy 2015 (IEEE S&P 2015) .2017
- 73. Xie X, Liu Y, Le W, et al. S-looper: automatic summarization for multipath string loops[C]// International Symposium on Software Testing and Analysis. ACM, 2015:188-198..2017
- 72. Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. Software Engineering IEEE Transactions on, 2015, 41(1):3-18..2017