Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts L Wang, A Liu, S Jajodia Computer communications 29 (15), 2917-2933, 2006 | 298 | 2006 |
SQLProb: a proxy-based architecture towards preventing SQL injection attacks A Liu, Y Yuan, D Wijesekera, A Stavrou Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009 | 151 | 2009 |
A fragile watermarking scheme for detecting malicious modifications of database relations H Guo, Y Li, A Liu, S Jajodia Information Sciences 176 (10), 1350-1378, 2006 | 150 | 2006 |
An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts L Wang, A Liu, S Jajodia Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 64 | 2005 |
Randroid: Structural similarity approach for detecting ransomware applications in android platform A Alzahrani, A Alshehri, H Alshahrani, R Alharthi, H Fu, A Liu, Y Zhu 2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018 | 40 | 2018 |
Attacker behavior analysis in multi-stage attack detection system R Katipally, L Yang, A Liu Proceedings of the seventh annual workshop on cyber security and information …, 2011 | 39 | 2011 |
Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications K Alghamdi, A Alqazzaz, A Liu, H Ming Proceedings of the Eighth ACM Conference on data and application security …, 2018 | 24 | 2018 |
Iotverif: Automatic verification of SSL/TLS certificate for IoT applications A Liu, A Alqazzaz, H Ming, B Dharmalingam IEEE Access 9, 27038-27050, 2019 | 21 | 2019 |
$ LiveForen $: Ensuring Live Forensic Integrity in the Cloud A Liu, H Fu, Y Hong, J Liu, Y Li IEEE Transactions on Information Forensics and Security 14 (10), 2749-2764, 2019 | 20 | 2019 |
Real-time detection of covert channels in highly virtualized environments A Liu, J Chen, L Yang Critical Infrastructure Protection V: 5th IFIP WG 11.10 International …, 2011 | 17 | 2011 |
Enhancing system-called-based intrusion detection with protocol context A Liu, X Jiang, J Jin, F Mao, J Chen IARIA SECURWARE (August 2011), 2011 | 12 | 2011 |
Secure streaming forensic data transmission for trusted cloud A Liu, J Liu, T Uehara Proceedings of the 2nd international workshop on Security and forensics in …, 2014 | 9 | 2014 |
Detection sound source direction in 3D space using convolutional neural networks X Yue, G Qu, B Liu, A Liu 2018 First International Conference on Artificial Intelligence for …, 2018 | 8 | 2018 |
Location privacy challenges in spatial crowdsourcing R Alharthi, A Banihani, A Alzahrani, A Alshehri, H Alshahrani, H Fu, A Liu, ... 2018 IEEE International Conference on Electro/Information Technology (EIT …, 2018 | 8 | 2018 |
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment A Liu, JX Chen, H Wechsler Intelligent Information Management 7 (6), 283-302, 2015 | 8 | 2015 |
Real-time covert timing channel detection in networked virtual environments A Liu, J Chen, H Wechsler Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013 | 7 | 2013 |
CloudForen: A novel framework for digital forensics in cloud computing M Nyamagwa, J Liu, A Liu, T Uehara Journal of Harbin Institute of Technology 21 (6), 39-45, 2014 | 4 | 2014 |
Genetic algorithm based parallelization planning for legacy real-time embedded programs Z Han, G Qu, B Liu, A Liu, W Cai, D Burkard 2018 First International Conference on Artificial Intelligence for …, 2018 | 3 | 2018 |
Dopa: Detecting open ports in android os A Alshehri, H Alshahrani, A Alzahrani, R Alharthi, H Fu, A Liu, Y Zhu 2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018 | 3 | 2018 |
Net-gpt: A llm-empowered man-in-the-middle chatbot for unmanned aerial vehicle B Piggott, S Patil, G Feng, I Odat, R Mukherjee, B Dharmalingam, A Liu 2023 IEEE/ACM Symposium on Edge Computing (SEC), 287-293, 2023 | 2 | 2023 |