Follow
Anyi Liu
Title
Cited by
Cited by
Year
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer communications 29 (15), 2917-2933, 2006
2962006
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
A Liu, Y Yuan, D Wijesekera, A Stavrou
Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009
1512009
A fragile watermarking scheme for detecting malicious modifications of database relations
H Guo, Y Li, A Liu, S Jajodia
Information Sciences 176 (10), 1350-1378, 2006
1502006
An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
622005
Randroid: Structural similarity approach for detecting ransomware applications in android platform
A Alzahrani, A Alshehri, H Alshahrani, R Alharthi, H Fu, A Liu, Y Zhu
2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018
382018
Attacker behavior analysis in multi-stage attack detection system
R Katipally, L Yang, A Liu
Proceedings of the seventh annual workshop on cyber security and information …, 2011
382011
Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications
K Alghamdi, A Alqazzaz, A Liu, H Ming
Proceedings of the Eighth ACM Conference on data and application security …, 2018
222018
Iotverif: Automatic verification of SSL/TLS certificate for IoT applications
A Liu, A Alqazzaz, H Ming, B Dharmalingam
IEEE Access 9, 27038-27050, 2019
192019
Real-time detection of covert channels in highly virtualized environments
A Liu, J Chen, L Yang
Critical Infrastructure Protection V: 5th IFIP WG 11.10 International …, 2011
172011
$ LiveForen $: Ensuring Live Forensic Integrity in the Cloud
A Liu, H Fu, Y Hong, J Liu, Y Li
IEEE Transactions on Information Forensics and Security 14 (10), 2749-2764, 2019
162019
Enhancing system-called-based intrusion detection with protocol context
A Liu, X Jiang, J Jin, F Mao, J Chen
IARIA SECURWARE (August 2011), 2011
122011
Secure streaming forensic data transmission for trusted cloud
A Liu, J Liu, T Uehara
Proceedings of the 2nd international workshop on Security and forensics in …, 2014
92014
Detection sound source direction in 3D space using convolutional neural networks
X Yue, G Qu, B Liu, A Liu
2018 First International Conference on Artificial Intelligence for …, 2018
82018
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
A Liu, JX Chen, H Wechsler
Intelligent Information Management 7 (6), 283-302, 2015
82015
Location privacy challenges in spatial crowdsourcing
R Alharthi, A Banihani, A Alzahrani, A Alshehri, H Alshahrani, H Fu, A Liu, ...
2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018
72018
Real-time covert timing channel detection in networked virtual environments
A Liu, J Chen, H Wechsler
Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013
72013
CloudForen: A novel framework for digital forensics in cloud computing
M Nyamagwa, J Liu, A Liu, T Uehara
Journal of Harbin Institute of Technology 21 (6), 39-45, 2014
42014
Genetic algorithm based parallelization planning for legacy real-time embedded programs
Z Han, G Qu, B Liu, A Liu, W Cai, D Burkard
2018 First International Conference on Artificial Intelligence for …, 2018
32018
Dopa: Detecting open ports in android OS
A Alshehri, H Alshahrani, A Alzahrani, R Alharthi, H Fu, A Liu, Y Zhu
2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018
32018
Heterogeneous Generative Dataset for UASes
B Dharmalingam, I Odat, R Mukherjee, B Piggott, A Liu
2023 IEEE International Conference on Mobility, Operations, Services and …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20