
Research Area
#Computer science#Computer security#Distributed computing#Cloud computing#Operating system#Software#Virtualization#Embedded system#Malware#Virtual machine
SCIE paper information
Papers relevant to ‘Computer science’: 5
Research performance of SCIE papers matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
2018/03 COMPUTERS & SECURITY 3.062 Impact Factor 17 citations
Data-Centric OS Kernel Malware Characterization
2014/01 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2.408 Impact Factor 16 citations
Papers for author ‘Dongyan Xu’: 5
Number of published SCIE papers by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
2018/03 COMPUTERS & SECURITY 3.062 Impact Factor 17 citations
Data-Centric OS Kernel Malware Characterization
2014/01 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2.408 Impact Factor 16 citations
conference information
Papers relevant to ‘Computer science’: 28
Research performance of Top-tier Conference matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
2016/01 NDSS Top-tier Conference 130 citations
X-force: force-executing binary programs for security applications
2014/08 SECURITY Top-tier Conference 90 citations
Papers for author ‘Dongyan Xu’: 28
Number of published Top-tier Conference by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
2016/01 NDSS Top-tier Conference 130 citations
X-force: force-executing binary programs for security applications
2014/08 SECURITY Top-tier Conference 90 citations
Log in to PhD.GO
Access the Bookmarks
Add or remove professors and programs of interest from your Bookmarks
Subscribe to the graduate program newsletters that you've bookmarked
Enter your test results to ensure you meet the minimum for each graduate program at Bookmarks
At a glance, see program deadlines you've bookmarked on your calendar