Anyi Liu
Title
Cited by
Cited by
Year
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer communications 29 (15), 2917-2933, 2006
2572006
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
A Liu, Y Yuan, D Wijesekera, A Stavrou
Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009
1382009
A fragile watermarking scheme for detecting malicious modifications of database relations
H Guo, Y Li, A Liu, S Jajodia
Information Sciences 176 (10), 1350-1378, 2006
1352006
An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
European Symposium on Research in Computer Security, 247-266, 2005
592005
Attacker behavior analysis in multi-stage attack detection system
R Katipally, L Yang, A Liu
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
252011
RanDroid: structural similarity approach for Detecting ransomware applications in android platform
A Alzahrani, A Alshehri, H Alshahrani, R Alharthi, H Fu, A Liu, Y Zhu
2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018
142018
Real-time detection of covert channels in highly virtualized environments
A Liu, J Chen, L Yang
International Conference on Critical Infrastructure Protection, 151-164, 2011
122011
Enhancing system-called-based intrusion detection with protocol context
A Liu, X Jiang, J Jin, F Mao, J Chen
IARIA SECURWARE (August 2011), 2011
112011
Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications
K Alghamdi, A Alqazzaz, A Liu, H Ming
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
102018
Secure streaming forensic data transmission for trusted cloud
A Liu, J Liu, T Uehara
Proceedings of the 2nd international workshop on Security and forensics in …, 2014
82014
$ LiveForen $: Ensuring Live Forensic Integrity in the Cloud
A Liu, H Fu, Y Hong, J Liu, Y Li
IEEE Transactions on Information Forensics and Security 14 (10), 2749-2764, 2019
72019
Location privacy challenges in spatial crowdsourcing
R Alharthi, A Banihani, A Alzahrani, A Alshehri, H Alshahrani, H Fu, A Liu, ...
2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018
62018
Real-time timing channel detection in an software-defined networking virtual environment
A Liu, JX Chen, H Wechsler
Intelligent Information Management 7 (06), 283, 2015
52015
Detection sound source direction in 3D space using convolutional neural networks
X Yue, G Qu, B Liu, A Liu
2018 First International Conference on Artificial Intelligence for …, 2018
42018
Real-time covert timing channel detection in networked virtual environments
A Liu, J Chen, H Wechsler
IFIP International Conference on Digital Forensics, 273-288, 2013
42013
CloudForen: A novel framework for digital forensics in cloud computing
M Nyamagwa, J Liu, A Liu, T Uehara
Journal of Harbin Institute of Technology 21 (6), 39-45, 2014
32014
Iotverif: Automatic verification of SSL/TLS certificate for IoT applications
A Liu, A Alqazzaz, H Ming, B Dharmalingam
IEEE Access, 2019
22019
Genetic algorithm based parallelization planning for legacy real-time embedded programs
Z Han, G Qu, B Liu, A Liu, W Cai, D Burkard
2018 First International Conference on Artificial Intelligence for …, 2018
22018
A new framework for privacy-preserving biometric-based remote user authentication
Y Tian, Y Li, RH Deng, N Li, P Wu, A Liu
Journal of Computer Security 28 (4), 469-498, 2020
12020
H-Verifier: Verifying Confidential System State with Delegated Sandboxes
A Liu, G Qu
International Conference on Science of Cyber Security, 126-140, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20