 | 2009 |
4 |  | Anyi Liu,
Yi Yuan,
Duminda Wijesekera,
Angelos Stavrou:
SQLProb: a proxy-based architecture towards preventing SQL injection attacks.
SAC 2009: 2054-2061 |
| 2006 |
3 |  | Lingyu Wang,
Anyi Liu,
Sushil Jajodia:
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.
Computer Communications 29(15): 2917-2933 (2006) |
2 |  | Huiping Guo,
Yingjiu Li,
Anyi Liu,
Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci. 176(10): 1350-1378 (2006) |
| 2005 |
1 |  | Lingyu Wang,
Anyi Liu,
Sushil Jajodia:
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
ESORICS 2005: 247-266 |