发表论文
[1] 刘宝旭, 李昊, 孙钰杰, 董放明, 孙天琦, 陈潇. 智能化漏洞挖掘与网络空间威胁发现综述. 信息安全研究[J]. 2023, 9(10): 932-939, http://lib.cqvip.com/Qikan/Article/Detail?id=7110577253.[2] Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu. Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning. USENIX Securitynull. 2023, [3] 白波, 冯云, 刘宝旭, 汪旭童, 何松林, 姚敦宇, 刘奇旭. 基于网络行为的攻击同源分析方法研究. 信息安全学报[J]. 2023, 8(2): 66-80, http://lib.cqvip.com/Qikan/Article/Detail?id=7109529684.[4] 张越, 陈庆旺, 刘宝旭, 于存威, 谭儒, 张方娇. 面向云原生的API攻击诱捕技术研究. 西安电子科技大学学报[J]. 2023, 50(4): 237-248, http://lib.cqvip.com/Qikan/Article/Detail?id=7110446512.[5] Xiang Xiaobo, Jiang Yue, Guo Qingli, Zhang Xiu, Gong Xiaorui, Liu Baoxu. AppChainer: investigating the chainability among payloads in android applications. CYBERSECURITY[J]. 2023, 6(4): 1-19, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7618329&detailType=1.[6] Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu, Wei Huo. NDFuzz:a non-intrusive coverage-guided fuzzing framework for virtualized network devices. 网络空间安全科学与技术(英文)[J]. 2023, 6(1): 54-74, http://lib.cqvip.com/Qikan/Article/Detail?id=7109341329.[7] Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu. Blockchain abnormal behavior awareness methods: a survey. CYBERSECURITY[J]. 2022, 5(1): 1-27, http://dx.doi.org/10.1186/s42400-021-00107-4.[8] 游奕哲, 江钧, 姜政伟, 杨沛安, 刘宝旭, 封化民, 王旭仁. TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification. International Computer Software and Applications Conference[J]. 2022, [9] 杜翔宇, 姜政伟, 江钧, 张开, 范子静, 董方明, 李宁, 刘宝旭. BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment. International Conference on Science of Cyber Securitynull. 2022, [10] 董聪, Chen YF, zhang yj, 刘玉岭, 卢志刚, Dong P, 刘宝旭. BEDIM : Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. HPCCnull. 2022, [11] Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu. Blockchain abnormal behavior awareness methods: a survey. 网络空间安全科学与技术(英文). 2022, 5(2): 92-118, http://lib.cqvip.com/Qikan/Article/Detail?id=7107732567.[12] 张禹, 钟楠宇, 游伟, 邹燕燕, 简鲲鹏, 许家欢, 孙俭, 刘宝旭, 霍玮. NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices. Cybersecurity[J]. 2022, 21 (2022)(5): [13] Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li. TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. CYBERSECURITY[J]. 2022, 5(1): 1-17, https://doaj.org/article/5ebb025138b7413eb1179baf81c4f985.[14] 刘延华, 李嘉琪, 欧振贵, 高晓玲, 刘西蒙, , 刘宝旭. 对抗训练驱动的恶意代码检测增强方法. 通信学报. 2022, 43(9): 169-180, https://d.wanfangdata.com.cn/periodical/txxb202209015.[15] Chen, Liangchen, Gao, Shu, Liu, Baoxu. An improved density peaks clustering algorithm based on grid screening and mutual neighborhood degree for network anomaly detection. SCIENTIFIC REPORTS[J]. 2022, 12(1): http://dx.doi.org/10.1038/s41598-021-02038-z.[16] 杨灿, Xu, Zhengzi, Chen, Hongxu, Liu, Yang, 龚晓锐, 刘宝旭. ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching. ICSEnull. 2022, [17] 宋秉华, 陈蓉, 刘宝旭, 姜政伟, 王旭仁. The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence. CSCWDnull. 2022, [18] 宋秉华, 陈蓉, 刘宝旭, 姜政伟, 王旭仁. Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence. ICCSnull. 2022, [19] Xingran Hao, Zhengwei Jiang, Qingsai Xiao, Qiuyun Wang, Yepeng Yao, Baoxu Liu, Jian Liu. Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data. 24th IEEE International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD)[J]. 2021, 384-390, [20] Zijian Jia, Yepeng Yao, Qiuyun Wang, Xuren Wang, Baoxu Liu, Zhengwei Jiang. Trojan Traffic Detection Based on Meta-learning. COMPUTATIONAL SCIENCE - ICCS 2021null. 2021, [21] 刘岳, 刘宝旭, 赵子豪, 刘潮歌, 王晓茜, 吴贤达. 基于特征组合的 Powershell 恶意代码检测方法. 信息安全学报[J]. 2021, [22] Zhang, Yu, Huo, Wei, Jian, Kunpeng, Shi, Ji, Liu, Longquan, Zou, Yanyan, Zhang, Chao, Liu, Baoxu. ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities. CYBERSECURITY[J]. 2021, 4(1): http://dx.doi.org/10.1186/s42400-021-00091-9.[23] Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Chen Kai, Haixu Tang. Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. IEEE Security and Privacy (S&P)null. 2021, [24] Dong, Cong, Lu, Zhigang, Cui, Zelin, Liu, Baoxu, Chen, Kai. MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 3589-3603, http://dx.doi.org/10.1109/TIFS.2021.3071595.[25] 冯云, 刘宝旭, 张越, 刘潮歌, 刘奇旭. Automated Honey Document Generation Using Genetic Algorithm. The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2021, Workshop)[J]. 2021, [26] 刘学章, 黄庆佳, 谢静, 贾晓启, 刘宝旭. 面向Web安全防护的蜜罐技术研究. 保密科学技术[J]. 2021, 28-33, http://lib.cqvip.com/Qikan/Article/Detail?id=7104463255.[27] Ding, Xiong, Liu, Baoxu, Jiang, Zhengwei, Wang, Qiuyun, Xin, Liling, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Spear Phishing Emails Detection Based on Machine Learning. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 354-359, [28] 刘宝旭, 张方娇, 刘嘉熹, 刘奇旭. 人工智能在网络攻防领域的应用及问题分析. 中国信息安全[J]. 2021, 32-36, http://lib.cqvip.com/Qikan/Article/Detail?id=7105626364.[29] 李丰, 朴爱花, 霍玮, 刘宝旭, 邹维. 固件安全检测技术概述. 保密科学技术[J]. 2021, 3-9, http://lib.cqvip.com/Qikan/Article/Detail?id=7106532998.[30] 冯云, 刘宝旭, 张金莉, 汪旭童, 刘潮歌, 申明喆, 刘奇旭. 一种无监督的窃密攻击及时发现方法. 计算机研究与发展[J]. 2021, [31] Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, Xiaofeng Wang, Luyi Xing, Baoxu Liu. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. Usenix Securitynull. 2021, [32] 凌玥, 刘玉岭, 姜波, 李宁, 卢志刚, 刘宝旭. 基于双层异质集成学习器的入侵检测方法. 信息安全学报[J]. 2021, 6(3): 16-28, [33] 章秀, 刘宝旭, 龚晓锐, 于磊, 宋振宇. Explore-Exploit:一种模拟真实网络渗透场景的安全竞赛. 信息安全学报[J]. 2020, 5(4): 55-71, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488255.[34] 蹇诗婕, 卢志刚, 姜波, 刘玉岭, 刘宝旭. 基于层次聚类方法的流量异常检测. 信息安全研究[J]. 2020, 6(6): 474-481, http://lib.cqvip.com/Qikan/Article/Detail?id=7101844396.[35] 蹇诗婕, 卢志刚, 杜丹, 姜波, 刘宝旭. 网络入侵检测技术综述. 信息安全学报[J]. 2020, 5(4): 96-122, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488257.[36] 陈良臣, 高曙, 刘宝旭, 陶明峰. 网络流量异常检测中的维数约简研究. 计算机工程[J]. 2020, 46(2): 11-20, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=JSJC202002002&v=MjMwNzRxVHJXTTFGckNVUjdxZVp1ZHZGeTdsVXIvTEx6N0JiYkc0SE5ITXJZOUZab1I4ZVgxTHV4WVM3RGgxVDM=.[37] 杨沛安, 刘宝旭, 杜翔宇. 面向攻击识别的威胁情报画像分析. 计算机工程[J]. 2020, 46(1): 136-143, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=JSJC202001019&v=MDk3NTJUM3FUcldNMUZyQ1VSN3FlWitkcUZDam5VYjNQTHo3QmJiRzRITkhNcm85RWJZUjhlWDFMdXhZUzdEaDE=.[38] Chen, Liangchen, Gao, Shu, Liu, Baoxu, Lu, Zhigang, Jiang, Zhengwei. THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. JOURNAL OF SUPERCOMPUTING[J]. 2020, 76(9): 7489-7518, https://www.webofscience.com/wos/woscc/full-record/WOS:000544146500002.[39] Dong, Cong, Zhang, Chen, Lu, Zhigang, Liu, Baoxu, Jiang, Bo. CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification. COMPUTERNETWORKS[J]. 2020, 176: http://dx.doi.org/10.1016/j.comnet.2020.107258.[40] 刘宝旭. THS-IDPC. A three-stage hierarchical sampling method for encrypted malicious traffic detection. Journal of Supercomputing. 2020, [41] Chen, Liangchen, Gao, Shu, Liu, Baoxu, Lu, Zhigang, Jiang, Zhengwei. FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack Detection. CHINA COMMUNICATIONS[J]. 2020, 17(5): 151-167, http://lib.cqvip.com/Qikan/Article/Detail?id=7101861525.[42] Gao, Xianwei, Hu, Changzhen, Shan, Chun, Liu, Baoxu, Niu, Zequn, Xie, Hui. Malware classification for the cloud via semi-supervised transfer learning. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS[J]. 2020, 55: http://dx.doi.org/10.1016/j.jisa.2020.102661.[43] 董聪, 姜波, 卢志刚, 刘宝旭, 李宁, 马平川, 姜政伟, 刘俊荣. 面向网络空间安全情报的知识图谱综述. 信息安全学报[J]. 2020, 5(5): 56-76, http://lib.cqvip.com/Qikan/Article/Detail?id=7103104855.[44] Zhang, Yu, Huo, Wei, Jian, Kunpeng, Shi, Ji, Lu, Haoliang, Liu, Longquan, Wang, Chen, Sun, Dandan, Zhang, Chao, Liu, Baoxu, ACM. SRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type Vulnerabilities. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA)null. 2019, 544-556, http://dx.doi.org/10.1145/3359789.3359826.[45] Yepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu. STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection. 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 13th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE)null. 2019, 120-127, [46] Cheng Yexia, Du Yuejin, Peng Jin, Fu Jun, Liu Baoxu, Yun X, Wen W, Lang B, Yan H, Ding L, Li J, Zhou Y. Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation. CYBER SECURITY, CNCERT 2018null. 2019, 970: 165-176, [47] Cheng Yexia, Du Yuejin, Peng Jin, Fu Jun, Liu Baoxu, Yun X, Wen W, Lang B, Yan H, Ding L, Li J, Zhou Y. Research on Identity Authentication Method Based on Negative Logic System. CYBER SECURITY, CNCERT 2018null. 2019, 970: 3-15, [48] 刘潮歌, 方滨兴, 刘宝旭, 崔翔, 刘奇旭. 定向网络攻击追踪溯源层次化模型研究. 信息安全学报[J]. 2019, 4(4): 1-18, http://lib.cqvip.com/Qikan/Article/Detail?id=7002765087.[49] Yepeng Yao, Liya Su, Chen Zhang, Zhigang Lu, Baoxu Liu. Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection. 19th Annual International Conference on Computational Science (ICCS)null. 2019, 11537: 102-115, [50] Liya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu. Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-based Network Attack Detection. 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 13th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE)null. 2019, 312-318, [51] Dong, Cong, Chen, YuFan, Zhang, YunJian, Jiang, Bo, Han, DongXu, Liu, BaoXu, Baru, C, Huan, J, Khan, L, Hu, XH, Ak, R, Tian, Y, Barga, R, Zaniolo, C, Lee, K, Ye, YF. An Approach for Scale Suspicious Network Events Detection. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA)null. 2019, 5854-5863, [52] Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu. Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE)null. 2018, 744-753, [53] 刘宝旭. 用户视角下的威胁情报质量评估方法. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018, [54] 刘宝旭. 面向流量异常检测的层次聚类网络流量约减方法. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018, [55] Li Qiang, Jiang Zhengwei, Yang Zeming, Liu Baoxu, Wang Xin, Zhang Yunan. A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 269-276, [56] 刘宝旭. 一种系统的PDF文档隐私泄露研究方法. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018, [57] 刘宝旭, 杨沛安, 武杨, 苏莉娅. 网络空间威胁情报共享技术综述. 计算机科学[J]. 2018, 45(6): 9-18,26, http://lib.cqvip.com/Qikan/Article/Detail?id=676176267.[58] Feng Yun, Liu Baoxu, Cui Xiang, Liu Chaoge, Kang Xuebin, Su Junwei, IEEE. A Systematic Method on PDF Privacy Leakage Issues. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 1020-1029, [59] 李川, 刘宝旭. ParaIntentFuzz:安卓应用漏洞的并行化模糊测试方法. 计算机工程与应用[J]. 2018, 54(4): 110-116, http://lib.cqvip.com/Qikan/Article/Detail?id=674442551.[60] 杨梅芳, 霍玮, 邹燕燕, 尹嘉伟, 刘宝旭, 龚晓锐, 贾晓启, 邹维. 可编程模糊测试技术. 软件学报[J]. 2018, 29(5): 1258-1274, http://lib.cqvip.com/Qikan/Article/Detail?id=675240626.[61] 霍玮, 戴戈, 史记, 龚晓锐, 贾晓启, 宋振宇, 刘宝旭, 邹维. 基于模式生成的浏览器模糊测试技术. 软件学报[J]. 2018, 29(5): 1275-1287, http://lib.cqvip.com/Qikan/Article/Detail?id=675240627.[62] 刘宝旭. 安全竞技和人才培养综述. The 13th International Conference on Information Security and Cryptology. 2017, [63] 章秀, 刘宝旭, 龚晓锐, 宋振宇. State-of-the-Art: Security Competition in Talent Education. International Conference on Information Security and Cryptology (INSCRYPT 2017)null. 2017, [64] Qiang Li, Dan Du, Zeming Yang, Baoxu Liu, Jian Yan. A Flexibility Method of QQ Forensic in Android System. 2017, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=IEEE201703002177&DbName=IPFDLAST2018&DbCode=IPFD&yx=&pr=&URLID=&bsm=.[65] Li Qiang, Yang Zeming, Jiang Zhengwei, Liu Baoxu, Fu Yuxia, Xu B. Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence. PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017)null. 2017, 62: 222-230, [66] 刘宝旭. A New Approach to Detecting Ransomware with Deception. 38th IEEE S&P. 2017, [67] 刘宝旭. Framework of Cyber Attack Attribution Based on Threat Intelligence. International Conference on Interoperability in IoT. 2016, [68] 杨泽明. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence. International Journal of Computer, Electrical, Automation, Control and Information Engineering(IJCEE). 2016, [69] 杨泽明, 李强, 刘俊荣, 刘宝旭. 面向攻击溯源的威胁情报共享利用研究. 信息安全研究[J]. 2015, 1(1): 31-36, http://lib.cqvip.com/Qikan/Article/Detail?id=670055416.[70] 王文槿, 刘宝旭. 一种基于关联规则挖掘的入侵检测系统. 核电子学与探测技术[J]. 2015, 35(2): 119-123, http://lib.cqvip.com/Qikan/Article/Detail?id=665006124.[71] 姜政伟, 王栋, 王怀宇, 杨泽明, 刘宝旭. 电力智能终端安全评估模型. 计算机工程与设计[J]. 2014, 35(1): 6-10, http://lib.cqvip.com/Qikan/Article/Detail?id=48316177.[72] 卢志刚, 刘俊荣, 刘宝旭. 基于GTST-MLD的复杂网络风险评估方法. 计算机科学[J]. 2014, 41(7): 194-199, http://lib.cqvip.com/Qikan/Article/Detail?id=662107288.[73] 卢志刚, 姜政伟, 刘宝旭. 一种基于VXLAN的虚拟网络访问控制方法. 计算机工程[J]. 2014, 40(8): 86-90,95, http://lib.cqvip.com/Qikan/Article/Detail?id=661899638.[74] 赵文瑞, 卢志刚, 姜政伟, 刘宝旭. 网络安全综合监控系统的设计与实现. 核电子学与探测技术[J]. 2014, 34(4): 419-424, http://lib.cqvip.com/Qikan/Article/Detail?id=662109569.[75] 姜政伟, 巫锡洪, 杨沛安, 刘宝旭. 基于SecSLA的云供应商选择方法. 计算机工程[J]. 2013, 39(10): 1-5, http://lib.cqvip.com/Qikan/Article/Detail?id=47384781.[76] 姜政伟, 刘宇, 刘宝旭. 基于CAI与综合集成思想的云平台选择方法. 计算机工程与应用[J]. 2013, 49(11): 1-5, http://lib.cqvip.com/Qikan/Article/Detail?id=45853682.[77] 刘宝旭. A Meta-Synthesis Approach for Cloud Service Provider Selection based on SecSLA. International Conference on Computational and Information Sciences(ICCIS). 2013, [78] 姜政伟, 赵文瑞, 刘宇, 刘宝旭. 基于等级保护的云计算安全评估模型. 计算机科学[J]. 2013, 40(8): 151-156, http://lib.cqvip.com/Qikan/Article/Detail?id=46861850.[79] 刘宇, 朱随江, 刘宝旭. 采用改进PTSVM的入侵检测研究. 计算机工程与应用[J]. 2012, 48(5): 1-3, http://lib.cqvip.com/Qikan/Article/Detail?id=40751864.[80] 朱随江, 刘宇, 刘宝旭, 姜政伟. 基于二叉决策图的网络可达性计算. 计算机工程与应用[J]. 2012, 48(4): 74-76, http://lib.cqvip.com/Qikan/Article/Detail?id=40592857.[81] 姜政伟, 王晓箴, 刘宝旭. 基于最小攻击树的UEFI恶意行为检测模型. 计算机工程与应用[J]. 2012, 48(32): 14-17, http://lib.cqvip.com/Qikan/Article/Detail?id=43856767.[82] 刘宇, 潘林, 刘宝旭. 复合型路由器级拓扑模型. 计算机工程与应用[J]. 2012, 48(28): 1-5, http://lib.cqvip.com/Qikan/Article/Detail?id=43343437.[83] 朱随江, 刘宝旭, 刘宇, 姜政伟. 有环攻击图中的节点风险概率算法. 计算机工程[J]. 2012, 38(3): 19-21, http://lib.cqvip.com/Qikan/Article/Detail?id=40994939.[84] 刘宇, 卢志刚, 刘宝旭. 一种松耦合网络安全态势感知模型. 计算机工程[J]. 2012, 38(14): 8-12, http://lib.cqvip.com/Qikan/Article/Detail?id=42669765.[85] 王泽东, 刘宇, 朱随江, 刘宝旭, 潘林. 采用行为分析的单机木马防护系统设计与实现. 计算机工程与应用[J]. 2011, 47(11): 46-48, http://lib.cqvip.com/Qikan/Article/Detail?id=37389414.[86] 王晓箴, 严坚, 吴焕, 刘宝旭. Ring0层敏感文件窃泄密监测系统. 计算机工程[J]. 2011, 37(8): 19-21, http://lib.cqvip.com/Qikan/Article/Detail?id=37517262.[87] 王晓箴, 于磊, 刘宝旭. 基于EDK2平台的数据备份与恢复技术. 计算机工程[J]. 2011, 37(15): 262-264, http://lib.cqvip.com/Qikan/Article/Detail?id=39071186.[88] 朱随江, 王泽东, 刘宇, 刘宝旭. 基于模板的WebMail审计系统的设计与实现. 计算机应用与软件[J]. 2011, 28(9): 67-69, http://lib.cqvip.com/Qikan/Article/Detail?id=39243750.[89] 王晓箴, 周振柳, 刘宝旭. BIOS采样分析系统的设计与实现. 计算机工程[J]. 2011, 37(11): 7-9, http://lib.cqvip.com/Qikan/Article/Detail?id=38307184.[90] 潘林, 吴雪卉, 吴焕, 刘宝旭. Internet拓扑生成器的比较与评估. 北京邮电大学学报[J]. 2011, 34(3): 53-57, http://lib.cqvip.com/Qikan/Article/Detail?id=38277322.[91] Xiaozhen Wang, Baoxu Liu. Risk Assessment Model Building and Malicious Behavior Detection on Computer Firmware. 2011, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=3&recid=&FileName=ZNXX201105008077&DbName=IPFDLAST2015&DbCode=IPFD&yx=&pr=&URLID=&bsm=.[92] 王超, 卢志刚, 刘宝旭. 面向等级保护的漏洞扫描系统的设计与实现. 核电子学与探测技术[J]. 2010, 30(7): 865-869, http://lib.cqvip.com/Qikan/Article/Detail?id=34907168.[93] 卢志刚, 刘建华, 刘宝旭, 许榕生. 基于HID的USB监控技术的设计与实现. 计算机工程[J]. 2010, 1-3, http://lib.cqvip.com/Qikan/Article/Detail?id=32940170.[94] 卢志刚, 潘林, 刘宝旭, 许榕生, 蒋文保. 信息安全风险管理绩效研究. 计算机科学[J]. 2010, 37(6): 40-42, http://lib.cqvip.com/Qikan/Article/Detail?id=34085548.[95] 刘宝旭. Attack detection by rough set theory in recommendation system. GrC 2010. 2010, [96] 王晓箴, 刘宝旭, 潘林. BIOS恶意代码实现及其检测系统设计. 计算机工程[J]. 2010, 36(21): 17-18, http://lib.cqvip.com/Qikan/Article/Detail?id=35748554.[97] 王晓箴, 卢志刚, 刘宝旭. 结合OCTAVE和灰色系统的信息安全风险评估方法. 北京邮电大学学报[J]. 2009, 32(5): 128-131, http://lib.cqvip.com/Qikan/Article/Detail?id=32018380.[98] Lu Zhigang, Wang Xiaozhen, Liu Baoxu, Xu Rongsheng, Li M, Yu F, Shu J, Chen ZG. Study on Efficiency of Risk Management for Information Security Based on Transaction. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL IInull. 2009, 356-360, http://dx.doi.org/10.1109/ISECS.2009.121.[99] 潘林, 王晓箴, 刘宝旭. 基于EFI BIOS的Ukey设备驱动的设计与实现. 计算机工程与应用[J]. 2008, 44(34): 69-71, http://lib.cqvip.com/Qikan/Article/Detail?id=28816268.[100] 刘宝旭, 陈泰伟, 池亚平, 许榕生. 基于模型的网络安全综合防护系统研究. 计算机工程[J]. 2007, 33(12): 151-153, http://lib.cqvip.com/Qikan/Article/Detail?id=24679501.[101] 李彦辉, 王述洋, 王春艳. 网络信息安全技术综述. 林业劳动安全[J]. 2007, 20(1): 25-29, http://lib.cqvip.com/Qikan/Article/Detail?id=23937608.[102] 何发镁, 刘宝旭, 冯勇. 嵌入式网络管理报警系统的设计. 计算机工程[J]. 2007, 33(20): 101-103, http://ir.ihep.ac.cn/handle/311005/218838.[103] 周振柳, 陈楣, 池亚平, 刘宝旭, 许榕生. 一种柔性可信计算机模型与实现方法. 计算机工程[J]. 2007, 33(20): 156-158, http://ir.ihep.ac.cn/handle/311005/218913.[104] 刘宝旭, 王晓箴, 池亚平. 网络安全评估方法的研究与实践. 计算机工程[J]. 2007, 33(16): 133-135, http://lib.cqvip.com/Qikan/Article/Detail?id=25211552.[105] 陈泰伟, 周振柳, 刘宝旭. 基于短信平台的服务器监控系统关键技术探讨. 核电子学与探测技术[J]. 2007, 27(6): 1050-1053, http://lib.cqvip.com/Qikan/Article/Detail?id=26785326.[106] 齐法制, 刘宝旭. 园区网监视系统设计与实现. 核电子学与探测技术[J]. 2007, 0-0, http://lib.cqvip.com/Qikan/Article/Detail?id=1000025097.[107] 叶进星, 翟伟斌, 刘宝旭, 蒋卓明, 许榕生. 基于MPMF算法的高速网络内容审计系统架构. 计算机工程[J]. 2007, 33(14): 104-106, http://lib.cqvip.com/Qikan/Article/Detail?id=24985760.[108] 周振柳, 刘宝旭, 池亚平, 许榕生. 计算机BIOS安全风险分析与检测系统研究. 计算机工程[J]. 2007, 33(16): 114-116, http://lib.cqvip.com/Qikan/Article/Detail?id=25211537.[109] 刘宝旭, 马建民, 池亚平. 计算机网络安全应急响应技术的分析与研究. 计算机工程[J]. 2007, 33(10): 128-130, http://lib.cqvip.com/Qikan/Article/Detail?id=24497668.[110] 裴尔明, 刘宝旭. 一种有效的风险评估模型、算法及流程. 计算机工程[J]. 2006, 32(23): 15-17, http://ir.ihep.ac.cn/handle/311005/218922.[111] 刘宝旭. 浅谈信息安全学科建设与人才培养. 北京电子科技学院学报[J]. 2006, 14(1): 10-12, http://lib.cqvip.com/Qikan/Article/Detail?id=21787973.[112] 陈明建, 刘宝旭, 许榕生. 电子邮件协议还原及分析系统的设计与实现. 计算机应用研究[J]. 2006, 23(12): 265-267+270, http://ir.ihep.ac.cn/handle/311005/218638.[113] 孙笑庆, 刘宝旭, 冯登国. Freenet下一代路由技术分析. 计算机工程[J]. 2005, 31(17): 126-128, http://lib.cqvip.com/Qikan/Article/Detail?id=20085336.[114] 曹爱娟, 刘宝旭, 许榕生. 抵御DDoS攻击的陷阱系统. 计算机工程[J]. 2004, 30(1): 10-13, http://lib.cqvip.com/Qikan/Article/Detail?id=9021350.[115] 刘宝旭. 基于WinPcap的网络监控系统性能优化的研究与实现. 计算机工程. 2004, [116] 李雪莹, 刘宝旭, 许榕生. 字符串匹配技术研究. 计算机工程[J]. 2004, 30(22): 24-26, http://lib.cqvip.com/Qikan/Article/Detail?id=11204666.[117] 刘宝旭, 孙笑庆, 崔石, 陆建强. Gnutella协议及数据包结构分析. 计算机工程[J]. 2004, 30(2): 8-10, http://lib.cqvip.com/Qikan/Article/Detail?id=9043818.[118] 刘宝旭, 李雪莹, 于传松, 许榕生. 对等网技术及应用概述. 计算机工程与应用[J]. 2003, 39(18): 1-3, http://lib.cqvip.com/Qikan/Article/Detail?id=8003359.[119] 刘宝旭, 许榕生. 黑客入侵防范体系的设计与实现. 计算机工程[J]. 2003, 29(12): 34-35, http://lib.cqvip.com/Qikan/Article/Detail?id=8048558.[120] 刘宝旭, 吴海燕, 许榕生. 网络隐患扫描系统设计与实现. 计算机工程与应用[J]. 2002, 38(1): 11-13, http://lib.cqvip.com/Qikan/Article/Detail?id=8391534.[121] 刘宝旭, 许榕生. 主动型安全防护措施—陷阱网络的研究与设计. 计算机工程[J]. 2002, 28(12): 9-11, http://lib.cqvip.com/Qikan/Article/Detail?id=7193230.[122] 刘宝旭, 毕学尧, 许榕生, 曾勇. 嵌入内核式动态防火墙的设计与实现. 计算机工程[J]. 2002, 28(2): 11-12, http://lib.cqvip.com/Qikan/Article/Detail?id=6011895.[123] 刘宝旭, 安德海, 许榕生. 基于Hash函数和自动恢复技术的网站抗毁系统研究与实现. 计算机工程与应用[J]. 2001, 37(24): 20-21, http://lib.cqvip.com/Qikan/Article/Detail?id=5678262.[124] 刘宝旭, 徐菁, 许榕生. 黑客入侵防护体系研究与设计. 计算机工程与应用[J]. 2001, 37(8): 1-3, http://lib.cqvip.com/Qikan/Article/Detail?id=5095351.