关注
Peng Liu
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
在 ist.psu.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
{EnclavePDP}: A General Framework to Verify Data Integrity in Cloud Using Intel {SGX}
Y He, Y Xu, X Jia, S Zhang, P Liu, S Chang
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
62020
{TaintPipe}: Pipelined symbolic taint analysis
J Ming, D Wu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security 15), 65-80, 2015
1032015
◾ Privacy Protection in Cloud Computing through Architectural Design
W Zang, M Yu, P Liu
Security in the Private Cloud, 343-368, 2016
12016
2013 Annual Meeting October 28-November 2, 2012
D PM, D PMA
Decision Making 546, 696a, 0
3GPP Specification Aided Discovery of Cascading Attacks
K Kotapati, P Liu, TF LaPorta
5-essential rooted maps on N-5
W Liu, Y Liu
Utilitas Mathematica 72, 51-64, 2007
12007
A cluster-based intrusion detection framework for monitoring the traffic of cloud environments
B Li, P Liu, L Lin
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
212016
A co-design adaptive defense scheme with bounded security damages against heartbleed-like attacks
Z Hu, P Chen, M Zhu, P Liu
IEEE Transactions on Information Forensics and Security 16, 4691-4704, 2021
42021
A Comparative Study on Trusted Path Discovery in Two Algorithms
T Berman, D Vyvyan, G Bent, P Dantressangle, J Lobo, F Ye, P Liu
A Comprehensive and Cross-Platform Test Suite for Memory Safety--Towards an Open Framework for Testing Processor Hardware Supported Security Extensions
W Song, J Ying, S Shen, B Li, H Ma, P Liu
arXiv preprint arXiv:2111.14072, 2021
2021
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
Information and Communications Security: 18th International Conference …, 2016
222016
A cyber security data triage operation retrieval system
C Zhong, T Lin, P Liu, J Yen, K Chen
Computers & Security 76, 12-31, 2018
832018
A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems
K Bai, P Liu
Proceedings of the 12th International Conference on Extending Database …, 2009
282009
A data mining technique to detect remote exploits
MM Masud, L Khan, B Thuraisingham, X Wang, P Liu, S Zhu
Proc. IFIP WG 11.9 International Conference on Digital Forensics, 27-30, 2008
102008
A distributed algorithm for workflow recovery
W Zang, M Yu, P Liu
A A 7 (T9), T10, 2007
42007
A equation for enumerating loopless unicursal maps
Y Liu
2011 IEEE International Conference on Computer Science and Automation …, 2011
2011
A fault tolerance approach to survivability
S Jajodia, P Liu, P Ammann
Proc IST 4th Symposium on Protecting NATO Information Systems 1, 1999
91999
A fault tolerance approach to survivability
P Ammann, S Jajodia, P Liu
Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998
131998
A fine-grained damage management scheme in a self-healing postgresql system
K Bai, P Liu
2008 11th IEEE High Assurance Systems Engineering Symposium, 373-382, 2008
12008
A first step towards algorithm plagiarism detection
F Zhang, YC Jhi, D Wu, P Liu, S Zhu
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
792012
系统目前无法执行此操作,请稍后再试。
文章 1–20