- Y. Wen, J. Zhao, and H. Wang,Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine . Selected by ISA'08 to Appear in the International Journal of Security and Its Applications (IJSIA),
- Y. Wen, J. Zhao, and H. Wang. Hiding “Real” Machine from Attackers and Malware with a Minimal Virtual Machine Monitor . Proceedings of 4th International Conference on Security and Privacy for Communication Networks (SecureComm’08, full paper). (acceptance ratio: 26/123=21%),
- Y. Wen, J. Zhao, H. Wang, J. Cao . Implicit Detection of Hidden Processes with a Feather-weight Hardware-Assisted Virtual Machine Monitor . in Proceedings of 13th Australasian Conference on Information Security and Privacy (ACIS
- 温研,王怀民 . 基于本地虚拟化技术的隔离运行模型研究 . 计算机学报 . 2008 年 10 期 , Vol. 3, No. 10 .
- P’08), 2008, LNCS 5107, pp. 361–375 (acceptance ratio: 33/111 = 29.7%), Citeseer 2007 Rank: 155
- Y. Wen, J. Zhao, and H. Wang,Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine. in Proceedings of 2th International Conference on Information Security and Assurance (ISA'08), 2008, pp. 150-155. (acceptance ratio: 122/459 = 26.6%)
- Y. Wen, J. Zhao, and H. Wang, An Novel Intrusion-Tolerant Approach for Internet Access , in Proceedings of 2008' International Symposium on Information Processing (ISIP'08), 2008.
2007
- Y. Wen, and H. Wang, A Secure Virtual Execution Environment for Untrusted Code , in Proceedings of 10th International Conference on Information Security and Cryptology (ICISC'07), 2007, LNCS 4817 , pp. 156-167. (acceptance ratio: 28/123 = 22.8%), Citeseer 2007 Rank: 349
- Y. Wen, J. Zhao, and H. Wang, A Novel Approach for Untrusted Code Execution . in Proceedings of 9th International Conference on Information and Communications Security (ICICS'07), 2007, LNCS 4861 , pp. 398-411. (acceptance ratio: 38/222 = 17.2%), Citeseer 2007 Rank: 371
Link: Citeseer 2007最新会议排名:http://citeseerx.ist.psu.edu/stats/venues;jsessionid=46763CA61C7AD828C78620055A671B6F?y=2007