A distributional attack scenario monitoring system based on dynamic peer-to-peer overlay hierarchy

Chu-Jiang Nie , Dong-Guo Feng , Zheng-Qing Han , Pu-Rui Su
international conference on machine learning and cybernetics 1 348 -355

2011
Notes on packet marking for IP traceback

De-Quan Li , Pu-Rui Su , Deng-Guo Feng
Journal of Software 15 ( 2) 250 -258

42
2004
Intrusion detection model based on executable static analysis

Pu-Rui Su , Yi Yang
CHINESE JOURNAL OF COMPUTERS-CHINESE EDITION- 29 ( 9) 1572 -1572

6
2006
IP traceback scheme based on marking-in-order.

Hai-Peng Qu , Deng-Guo Feng , Pu-Rui Su
Dianzi Xuebao(Acta Electronica Sinica) 34 ( 1) 173 -176

3
2006
Anomaly intrusion detection model based on nonhierarchical clustering.

Pu-Rui Su , Deng-Guo Feng
Dianzi Xuebao(Acta Electronica Sinica) 34 ( 10) 1809 -1811

5
2006
Attack signature generation by traceable dynamic taint analysis

Yu Liu , Mei-Ning Nie , Pu-Rui Su , Deng-Guo Feng
Journal of China Institute of Communications 33 ( 5) 21 -28

3
2012
An anti-obfuscation malware variants identification system

Rui Wang , Pu-Rui Su , Yi Yang , Deng-Guo Feng
Dianzi Xuebao(Acta Electronica Sinica) 39 ( 10) 2322 -2330

3
2011
Policy and algorithm to block instant messaging.

Zhen-Yu Hu , Zai-Qiang Liu , Pu-Rui Su , Deng-Guo Feng
Dianzi Xuebao(Acta Electronica Sinica) 33 ( 10) 1830 -1834

3
2005
Semantics-Based Malware Behavior Signature Extraction and Detection Method

SU Pu-Rui , Wang Rui , Yang Yi , Feng Deng-Guo
Journal of Software

6
2012
Detection of the malicious code injection by hooking system calls in kernel mode

Li Wei , SU Pu-Rui
Journal of University of Chinese Academy of Sciences 27 ( 5) 695

2010
A technique for detecting malicious documents based on calculation of vector spaces

LI Wei , SU Pu-Rui , SHI Yun-Feng
Journal of University of Chinese Academy of Sciences 27 ( 2) 267 -267

2
2010
Software protection method based on self-modification mechanism

WANG Xiang-Gen , SI Duan-Feng , FENG Deng-Guo , SU Pu-Rui
Journal of the Graduate School of the Chinese Academy of Sciences

2009
A typical noisy covert channel in the IP protocol

Haipeng Qu , Purui Su , Dengguo Feng
international carnahan conference on security technology 189 -192

19
2004
Blocking MSN: A Case Study of Preventing the Abuse of IM

Zhenyu Hu , Zaiqiang Liu , Purui Su , Dengguo Feng
asia-pacific conference on communications 1112 -1116

6
2005
The Design of an Artificial Immune System

Purui Su , Dengguo Feng
international conference on networking 195 -195

9
2006
Black-box testing based on colorful taint analysis

Kai Chen , DengGuo Feng , PuRui Su , YingJun Zhang
Science China Information Sciences 55 ( 1) 171 -183

6
2012
Adaptive packet marking for IP traceback

D-q Li , Y-d Xu , P-r Su , D-g Feng
Acta Electronica Sinica 32 ( 8) 1334 -1337

11
2004
Colluding clique detector based on activity similarity in P2P trust model [J]

Miao Guang-Sheng , Feng Deng-Guo , Su Pu-Rui
Journal on Communications 30 ( 8) 9 -20

8
2009
P2P-based super botnet: threats and defenses

Ying Ling-Yun , Feng Deng-Guo , Su Pu-Rui
Acta Electronica Sinica 37 ( 1) 31 -37

8
2009
Router Numbering Based Adaptive Packet Marking

Li De-Quan , Su Pu-Rui , Wei Dong-Mei , Feng Deng-Guo
Journal of Software 18 ( 10) 2652

1
2007