Bingfeng Xu

Orcid: 0000-0003-2574-9627

According to our database1, Bingfeng Xu authored at least 21 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Architecture-oriented security strategy determination for cyber-physical systems.
Concurr. Comput. Pract. Exp., 2023

2022
Secure and Efficient Traffic Obfuscation for Smart Home.
Proceedings of the IEEE Global Communications Conference, 2022

One-Shot Detection of Malicious TLS Traffic.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Analysis Method of Security Critical Components of Industrial Cyber Physical System based on SysML.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

A Hybrid Attack Graph Analysis Method based on Model Checking.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2021
ME-Box: A reliable method to detect malicious encrypted traffic.
J. Inf. Secur. Appl., 2021

PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection.
Comput. Networks, 2021

Preventing IoT DDoS Attacks using Blockchain and IP Address Obfuscation.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

2020
A Minimum Defense Cost Calculation Method for Attack Defense Trees.
Secur. Commun. Networks, 2020

On-Device Detection of Repackaged Android Malware via Traffic Clustering.
Secur. Commun. Networks, 2020

Optimal Defense Policies for Cost-Constrained Cyber Physical System.
Proceedings of the Eighth International Conference on Advanced Cloud and Big Data, 2020

2019
基于状态事件故障树的信息物理融合系统风险建模 (Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees).
计算机科学, 2019

A Minimum Defense Cost Calculation Method for Cyber Physical System.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network.
Secur. Commun. Networks, 2018

基于攻击图的信息物理融合系统渗透测试方法 (Penetration Testing Method for Cyber-Physical System Based on Attack Graph).
计算机科学, 2018

Mobile app identification for encrypted network flows by traffic correlation.
Int. J. Distributed Sens. Networks, 2018

Spotting review spammer groups: A cosine pattern and network based method.
Concurr. Comput. Pract. Exp., 2018

2017
Identifying Mobile Applications for Encrypted Network Traffic.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2014
A Novel Method to Detect Encrypted Data Exfiltration.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

2013
Minimal cut sequence generation for state/event fault trees.
Proceedings of the 2013 Middleware Doctoral Symposium, 2013

2010
Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010


  Loading...