2020-05-19BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals(NDSS 2019)papers / security / mobile_security
2020-05-18LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics(ICSE 2019)papers / security / automatic_analyse
2020-05-11B2SFinder——Detecting Open-Source Software Reuse in COTS Software(ASE 2019)papers / security / automatic_analyse
2020-04-17Beyond Free Riding-Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligencepapers / security / security_situation_awareness
2020-04-15An analysis and classification of public information securiy data sources used in research and practicepapers / security / security_situation_awareness
2021-10-22Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths(CCS 2021)papers / security / automatic_analyse