
Research Area
#Computer science#Computer security#Information flow (information theory)#Security policy#Software#Information security#Access control#Program analysis#Code (cryptography)#Language-based security
SCIE paper information
Papers relevant to ‘Computer science’: 2
Research performance of SCIE papers matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Using Architecture to Reason about Information Security
2015/12 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 0.76 Impact Factor 9 citations
A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version)
2017/11 COMPUTERS & SECURITY 2.65 Impact Factor 5 citations
Papers for author ‘Stephen Chong’: 2
Number of published SCIE papers by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Using Architecture to Reason about Information Security
2015/12 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 0.76 Impact Factor 9 citations
A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version)
2017/11 COMPUTERS & SECURITY 2.65 Impact Factor 5 citations
conference information
Papers relevant to ‘Computer science’: 4
Research performance of Top-tier Conference matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Precise, dynamic information flow for database-backed applications
2016/06 PLDI Top-tier Conference 65 citations
Exploring and enforcing security guarantees via program dependence graphs
2015/06 PLDI Top-tier Conference 32 citations
Papers for author ‘Stephen Chong’: 4
Number of published Top-tier Conference by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Precise, dynamic information flow for database-backed applications
2016/06 PLDI Top-tier Conference 65 citations
Exploring and enforcing security guarantees via program dependence graphs
2015/06 PLDI Top-tier Conference 32 citations
Log in to PhD.GO
Access the Bookmarks
Add or remove professors and programs of interest from your Bookmarks
Subscribe to the graduate program newsletters that you've bookmarked
Enter your test results to ensure you meet the minimum for each graduate program at Bookmarks
At a glance, see program deadlines you've bookmarked on your calendar