Segui
Anyi Liu
Titolo
Citata da
Citata da
Anno
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer communications 29 (15), 2917-2933, 2006
3032006
A fragile watermarking scheme for detecting malicious modifications of database relations
H Guo, Y Li, A Liu, S Jajodia
Information Sciences 176 (10), 1350-1378, 2006
1552006
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
A Liu, Y Yuan, D Wijesekera, A Stavrou
Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009
1522009
An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
652005
Randroid: Structural similarity approach for detecting ransomware applications in android platform
A Alzahrani, A Alshehri, H Alshahrani, R Alharthi, H Fu, A Liu, Y Zhu
2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018
422018
Attacker behavior analysis in multi-stage attack detection system
R Katipally, L Yang, A Liu
Proceedings of the seventh annual workshop on cyber security and information …, 2011
392011
Iotverif: Automatic verification of SSL/TLS certificate for IoT applications
A Liu, A Alqazzaz, H Ming, B Dharmalingam
IEEE Access 9, 27038-27050, 2019
262019
Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications
K Alghamdi, A Alqazzaz, A Liu, H Ming
Proceedings of the Eighth ACM Conference on data and application security …, 2018
252018
$ LiveForen $: Ensuring Live Forensic Integrity in the Cloud
A Liu, H Fu, Y Hong, J Liu, Y Li
IEEE Transactions on Information Forensics and Security 14 (10), 2749-2764, 2019
212019
Real-time detection of covert channels in highly virtualized environments
A Liu, J Chen, L Yang
Critical Infrastructure Protection V: 5th IFIP WG 11.10 International …, 2011
172011
Enhancing system-called-based intrusion detection with protocol context
A Liu, X Jiang, J Jin, F Mao, J Chen
IARIA SECURWARE (August 2011), 2011
122011
Location privacy challenges in spatial crowdsourcing
R Alharthi, A Banihani, A Alzahrani, A Alshehri, H Alshahrani, H Fu, A Liu, ...
2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018
92018
Secure streaming forensic data transmission for trusted cloud
A Liu, J Liu, T Uehara
Proceedings of the 2nd international workshop on Security and forensics in …, 2014
92014
Detection sound source direction in 3D space using convolutional neural networks
X Yue, G Qu, B Liu, A Liu
2018 First International Conference on Artificial Intelligence for …, 2018
82018
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
A Liu, JX Chen, H Wechsler
Intelligent Information Management 7 (6), 283-302, 2015
82015
Real-time covert timing channel detection in networked virtual environments
A Liu, J Chen, H Wechsler
Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013
72013
Net-gpt: A llm-empowered man-in-the-middle chatbot for unmanned aerial vehicle
B Piggott, S Patil, G Feng, I Odat, R Mukherjee, B Dharmalingam, A Liu
2023 IEEE/ACM Symposium on Edge Computing (SEC), 287-293, 2023
62023
Genetic algorithm based parallelization planning for legacy real-time embedded programs
Z Han, G Qu, B Liu, A Liu, W Cai, D Burkard
2018 First International Conference on Artificial Intelligence for …, 2018
42018
CloudForen: A novel framework for digital forensics in cloud computing
M Nyamagwa, J Liu, A Liu, T Uehara
Journal of Harbin Institute of Technology 21 (6), 39-45, 2014
42014
Dopa: Detecting open ports in android os
A Alshehri, H Alshahrani, A Alzahrani, R Alharthi, H Fu, A Liu, Y Zhu
2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018
32018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20