Feng Xie

Affiliations:
  • China Information Technology Security Evaluation Center, Beijing, China


According to our database1, Feng Xie authored at least 13 papers between 2009 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2013
Security Testing Methods and Techniques of Industrial Control Devices.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Security Analysis on Cyber-physical System Using Attack Tree.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Cyber-physical System Risk Assessment.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2012
Designated Verifier Signature Scheme over Circulant Matrices.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A New Detection Algorithm of Moving Objects Based on Human Morphology.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A risk management framework for cloud computing.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Stability analysis of software networks.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2009
Privacy Aware Engineering: A Case Study.
J. Softw., 2009

A Practical Database Intrusion Detection System Framework.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009


  Loading...