Yan Wen
Affiliations:- Beijing Linzhuo Infomation Technology, China
- National Key Laboratory of Science and Technology on Information System Security, Beijing, China (former)
- National University of Defense Technology, Changsha, China (former)
According to our database1,
Yan Wen
authored at least 30 papers
between 2007 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019
2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Towards sharing disks between host OS and virtual machine with volume snapshot technology.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013
Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology.
Proceedings of the IEEE 11th International Conference on Dependable, 2013
2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
Towards a Flaw Function Heuristic Vulnerability Static Analysis Framework for Executable File.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Research on Technologies of Building Experimental Environment for Network Worm Simulation.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
2008
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the International Symposium on Information Processing, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007