Author of the publication

OpenSSL HeartBleed: Security Management of Implements of Basic Protocols.

, , , , and . 3PGCIC, page 520-524. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthesis Algorithm of Homology Detection Based on AHP., , , , , and . Int. J. Comput. Intell. Syst., 6 (6): 1143-1150 (2013)Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm., , , and . 3PGCIC, page 116-120. IEEE Computer Society, (2015)Mocov: Model Based Fuzzing Through Coverage Guided Technology., , , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 404-413. Springer, (2017)JavaScript Malicious Codes Analysis Based on Naive Bayes Classification., , , , and . 3PGCIC, page 513-519. IEEE Computer Society, (2014)Computation of moments for Maxwell's equations with random interfaces via pivoted low-rank approximation., , , and . J. Comput. Physics, (2018)A Robust Numerical Method for the Random Interface Grating Problem via Shape Calculus, Weak Galerkin Method, and Low-Rank Approximation., , , and . J. Sci. Comput., 77 (1): 419-442 (2018)Homology Detection Based on Abstract Syntax Tree Combined Simple Semantics Analysis., , , , and . Web Intelligence/IAT Workshops, page 410-414. IEEE Computer Society, (2010)978-0-7695-4191-4.OpenSSL HeartBleed: Security Management of Implements of Basic Protocols., , , , and . 3PGCIC, page 520-524. IEEE Computer Society, (2014)A Security Vulnerability Threat Classification Method., , , , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 414-426. Springer, (2017)A taint based approach for automatic reverse engineering of gray-box file formats., , , and . Soft Comput., 20 (9): 3563-3578 (2016)