chencwx / Literature-exam

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

基础文献笔记模板

先每篇单独放在「基础文献笔记」文件夹中,最终整理至文件夹下的README.md 以下是理工类著作的模板,已经包括两种题型的并集,每篇不少于1000字

著作名称

科学问题

基础理论

技术框架/关键技术

研究方法

前沿进展/研究进展

创新点

创新建议

以下是人文社科类著作的模板,已经包括两种题型的并集,每篇不少于1000字

著作名称

科学问题

研究方法

主要内容

关键技术

创新点

研究进展

核心观点

由此引发的学术思考


专业文献笔记模板

先每篇单独放在「专业文献笔记」文件夹中,最终整理至文件夹下的README.md 以应对面试为方向进行准备,无字数要求

著作名称

研究内容

科学问题

创新性

对学位论文选题方向的思考

附录:文献列表

基础文献

  1. ***.敏锐抓住信息化发展历史机遇自主创新推进网络强国建设[J].党建,2018(05):1.
  2. 沈昌祥,左晓栋.网络空间安全导论[M].北京:电子工业出版社,2018.
  3. 杨义先,钮心忻.安全简史:从隐私保护到量子密码[M].电子工业出版社,2017.
  4. 科弗,托马斯.信息论基础[M].阮吉寿,等,译.北京:机械工业出版社,2008.
  5. 拉森,马克思.数理统计及其应用[M].北京:机械工业出版社,2019.
  6. 殷俊峰.矩阵分析[M].上海:同济大学出版社,2017.
  7. 周志华.机器学习[M].北京:清华大学出版社,2016.
  8. 王燕军,梁治安,崔雪婷.最优化基础理论与方法:第2 版[M].上海:复旦大学出版社,2018.
  9. 冈萨雷斯,伍兹.数字图像处理:第4 版[M].阮秋琦,阮宇智,译.北京:电子工业出版社,2020.
  10. 何晗.自然语言处理入门[M].北京:人民邮电出版社,2019.
  11. GOODFELLOW I, BENGIO Y, COURVILLE A, et al. Deep learning[M]. Cambridge: The MIT Press, 2016.
  12. GHAFFARIAN S M, SHAHRIARI H R. Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey[J]. ACM Computing Surveys(CSUR), 2017, 50(4): 1-36.
  13. KHRAISAT A, GONDAL I, VAMPLEW P, et al. Survey of intrusion detection systems: techniques, datasets and challenges[J]. Cybersecurity, 2019, 2(1): 1-22.
  14. ZHENG Z, XIE S, DAI H, et al. An overview of blockchain technology: Architecture, consensus, and future trends[C]//2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 2017: 557-564.
  15. 费孝通.乡土**[M].上海人民出版社, 2013.
  16. 李泽厚.美的历程[M].北京:生活.读书.新知三联书店,2014.

专业文献

恶意软件分析与检测

  1. [22]SOURI A, HOSSEINI R. A state-of-the-art survey of malware detection approaches using data mining techniques[J]. Human-centric Computing and Information Sciences, 2018, 8(01):1-22. wgc
  2. [40]MONNAPPA K A. Learning malware analysis: explore the concepts, tools, and techniques to analyze and investigate windows malware[M]. Packt Publishing Ltd, 2018. cwx
  3. [42]SIHWAIL R, OMAR K, ARIFFIN K A Z. A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis[J]. International Journal on Advanced Science, Engineering and Information Technology, 2018, 8(4-2): 1662. hyf
  4. [43]ARSHAD S, SHAH M A, KHAN A, et al. Android malware detection & protection: a survey[J]. International Journal of Advanced Computer Science and Applications, 2016,7(02): 463-475. YT
  5. [64]MCLAUGHLIN N, MARTINEZ DEL RINCON J, KANG B J, et al. Deep android malware detection[C]//Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. 2017: 301-308. cwx
  6. [65]DAMODARAN A, DI TROIA F, VISAGGIO C A, et al. A comparison of static, dynamic, and hybrid analysis for malware detection[J]. Journal of Computer Virology and Hacking Techniques, 2017, 13(01): 1-12. cwx
  7. [66]VINAYAKUMAR R, ALAZAB M, SOMAN K P, et al. Robust intelligent malware detection using deep learning[J]. IEEE Access, 2019, 7: 46717-46738. sn

漏洞扫描与检测

  1. [18]邹权臣,张涛,吴润浦,等.从自动化到智能化:软件漏洞挖掘技术进展[J].清华大学学报:自然科学版, 2018, 58(12):1079-1094.
  2. [19]郑尧文,文辉,程凯,等.物联网设备漏洞挖掘技术研究综述[J].信息安全学报,2019,4(5):61-75.
  3. [21]YU M, ZHUGE J, CAO M, et al. A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices[J]. Future Internet, 2020, 12(02): 27. sn
  4. [24]XIE W , JIANG Y , TANG Y , et al. Vulnerability Detection in IoT Firmware: A Survey[C] IEEE.2017 IEEE 23rd International Conference on Parallel and Distributed Systems(ICPADS). IEEE, 2017. sxh
  5. [25]NESHENKO N, BOU-HARB E, CRICHIGNO J, et al. Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations[J]. IEEE Communications Surveys & Tutorials, 2019, 21(03): 2702-2733. sxh
  6. [26]MENEGHELLO F, CALORE M, ZUCCHETTO D, et al. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices[J]. IEEE Internet of Things Journal,2019, 6(05): 8182-8201. sxh
  7. [47]LIU B , SHI L , CAI Z , et al. Software vulnerability discovery techniques: a survey[C]//IEEE. Fourth International Conference on Multimedia Information Networking & Security.IEEE, 2013. ygz

入侵检测

  1. [23] MANES V J M , HAN H S , HAN C , et al. The Art, Science, and Engineering of Fuzzing: A Survey[J]. IEEE Transactions on Software Engineering, 2019, 47(11):1-23.
  2. [44]KHRAISAT A, GONDAL I, VAMPLEW P, et al. Survey of intrusion detection systems: techniques, datasets and challenges[J]. Cybersecurity, 2019, 2(01): 1-22. cwx
  3. [45]RING M , WUNDERLICH S , SCHEURING D , et al. A Survey of Network-based Intrusion Detection Data Sets[J]. Computers & Security, 2019, 86:147-167. ygz(ppt)
  4. [48]ZARPELAO B B , MIANI R S , KAWAKANI C T , et al. A survey of intrusion detection in Internet of Things[J]. Journal of Network & Computer Applications, 2017, 84(Apr.):25-37. jqy,cwx
  5. [61]SHARAFALDIN I, LASHKARI A H, GHORBANI A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization[C]//ICISSp. 2018: 108-116. jqy,cwx
  6. [62]SHONE N, NGOC T N, PHAI V D, et al. A deep learning approach to network intrusion detection[J]. IEEE transactions on emerging topics in computational intelligence, 2018, 2(01): 41-50. sn
  7. [63]KHRAISAT A, GONDAL I, VAMPLEW P, et al. Survey of intrusion detection systems: techniques, datasets and challenges[J]. Cybersecurity, 2019, 2(01): 1-22. cwx

数据安全

  1. [17]古德费洛,本吉奥,库维尔.深度学习[M].赵申剑,黎彧君,符天凡,等译.北京:人民邮电出版社,2017.
  2. [20]丁兆云,刘凯,刘斌,等.网络安全知识图谱研究综述[J].华中科技大学学报:自然科学版,2021,49(07): 79-91.
  3. [27]埃尔,马哈茂德,普蒂尼.云计算:概念、技术与架构[M].龚奕利,贺莲,胡创,译.北京:机械工业出版社,2017.
  4. [28]詹金斯,斯蒂芬森.计算机离散数学基础[M].董笑菊,等译.北京:机械工业出版社,2020.
  5. [39]刘睿瑄,陈红,郭若杨,等.机器学习中的隐私攻击与防御[J].软件学报.2020,31(3):866-892.
  6. [52]ABADI M, CHU A, GOODFELLOW I, et al. Deep learning with differential privacy[C]//Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016: 308-318.
  7. [51]RISTENPART T, TROMER E, SHACHAM H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds[C]//Proceedings of the 16th ACM conference on Computer and communications security. 2009: 199-212.

密码学与区块链

  1. [20]丁兆云,刘凯,刘斌,等.网络安全知识图谱研究综述[J].华中科技大学学报:自然科学版,2021,49(07): 79-91.
  2. [23]MANES V J M , HAN H S , HAN C , et al. The Art, Science, and Engineering of Fuzzing: A Survey[J]. IEEE Transactions on Software Engineering, 2019, 47(11):1-23.
  3. [35]曾诗钦,霍如,黄韬,等.区块链技术研究综述:原理、进展与应用[J].通信学报.2020,41(01):134-151.
  4. [46]JUN L , BODONG Z , CHAO Z . Fuzzing: a survey[J]. Cybersecurity, 2018, 1(01):6-19.
  5. [53]ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains[C]//Proceedings of the thirteenth EuroSys conference. 2018: 1-15.
  6. [54]KOSBA A, MILLER A, SHI E, ET AL. HAWK: The blockchain model of cryptography and privacy-preserving smart contracts[C]//2016 IEEE symposium on security and privacy (SP). IEEE, 2016: 839-858.
  7. [60]JIANG B, LIU Y, CHAN W K. Contractfuzzer: Fuzzing smart contracts for vulnerability detection[C]//2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2018: 259-269.

About