Follow
Qi Liao
Title
Cited by
Cited by
Year
Botnet economics: uncertainty matters
Z Li, Q Liao, A Striegel
Managing information risk and the economics of security, 245-267, 2009
1102009
RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning
CD Mano, A Blaich, Q Liao, Y Jiang, DA Cieslak, DC Salyers, A Striegel
ACM Transactions on Information and System Security (TISSEC) 11 (2), 1-23, 2008
712008
1.5 D egocentric dynamic network visualization
L Shi, C Wang, Z Wen, H Qu, C Lin, Q Liao
IEEE transactions on visualization and computer graphics 21 (5), 624-637, 2014
572014
Visualizing graph dynamics and similarity for enterprise network security and management
Q Liao, A Striegel, N Chawla
Proceedings of the seventh international symposium on visualization for …, 2010
522010
Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets
Z Li, Q Liao
Government Information Quarterly 35 (1), 151-160, 2018
502018
SAVE: Sensor anomaly visualization engine
L Shi, Q Liao, Y He, R Li, A Striegel, Z Su
2011 IEEE Conference on Visual Analytics Science and Technology (VAST), 201-210, 2011
462011
Hierarchical focus+ context heterogeneous network visualization
L Shi, Q Liao, H Tong, Y Hu, Y Zhao, C Lin
2014 IEEE Pacific visualization symposium, 89-96, 2014
382014
Scalable network traffic visualization using compressed graphs
L Shi, Q Liac, X Sun, Y Chen, C Lin
2013 IEEE International Conference on Big Data, 606-612, 2013
362013
Adversarial machine learning for spam filters
B Kuchipudi, RT Nannapaneni, Q Liao
Proceedings of the 15th International Conference on Availability …, 2020
332020
Bridging the gap of network management and anomaly detection through interactive visualization
T Zhang, Q Liao, L Shi
2014 IEEE Pacific Visualization Symposium, 253-257, 2014
312014
WiiLab: bringing together the Nintendo Wiimote and MATLAB
J Brindza, J Szweda, Q Liao, Y Jiang, A Striegel
2009 39th IEEE Frontiers in Education Conference, 1-6, 2009
302009
Visual analysis of large-scale network anomalies
Q Liao, L Shi, C Wang
IBM Journal of Research and Development 57 (3/4), 13: 1-13: 12, 2013
262013
Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling ransomware
Z Li, Q Liao
Proceedings of the 15th International Conference on Availability …, 2020
202020
ENAVis: Enterprise Network Activities Visualization.
Q Liao, A Blaich, A Striegel, D Thain
LISA, 59-74, 2008
202008
Managing networks through context: Graph visualization and exploration
Q Liao, A Blaich, D VanBruggen, A Striegel
Computer Networks 54 (16), 2809-2824, 2010
182010
Game Theory of Data-selling Ransomware.
Z Li, Q Liao
J. Cyber Secur. Mobil. 10 (1), 65-96, 2021
172021
Preventive portfolio against data-selling ransomware—A game theory of encryption and deception
Z Li, Q Liao
Computers & Security 116, 102644, 2022
152022
Portfolio optimization of computer and mobile botnets
Q Liao, Z Li
International Journal of Information Security 13, 1-14, 2014
152014
Intelligent network management using graph differential anomaly visualization
Q Liao, A Striegel
2012 IEEE Network Operations and Management Symposium, 1008-1014, 2012
142012
User password repetitive patterns analysis and visualization
X Yu, Q Liao
Information & Computer Security 24 (1), 93-115, 2016
132016
The system can't perform the operation now. Try again later.
Articles 1–20