Qi Liao
Cited by
Cited by
Botnet economics: uncertainty matters
Z Li, Q Liao, A Striegel
Managing information risk and the economics of security, 245-267, 2009
RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning
CD Mano, A Blaich, Q Liao, Y Jiang, DA Cieslak, DC Salyers, A Striegel
ACM Transactions on Information and System Security (TISSEC) 11 (2), 1-23, 2008
Visualizing graph dynamics and similarity for enterprise network security and management
Q Liao, A Striegel, N Chawla
Proceedings of the seventh international symposium on visualization for …, 2010
1.5 D egocentric dynamic network visualization
L Shi, C Wang, Z Wen, H Qu, C Lin, Q Liao
IEEE transactions on visualization and computer graphics 21 (5), 624-637, 2014
SAVE: Sensor anomaly visualization engine
L Shi, Q Liao, Y He, R Li, A Striegel, Z Su
2011 IEEE Conference on Visual Analytics Science and Technology (VAST), 201-210, 2011
Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets
Z Li, Q Liao
Government Information Quarterly 35 (1), 151-160, 2018
Scalable network traffic visualization using compressed graphs
L Shi, Q Liac, X Sun, Y Chen, C Lin
2013 IEEE International Conference on Big Data, 606-612, 2013
Hierarchical focus+ context heterogeneous network visualization
L Shi, Q Liao, H Tong, Y Hu, Y Zhao, C Lin
2014 IEEE Pacific Visualization Symposium, 89-96, 2014
WiiLab: bringing together the Nintendo Wiimote and MATLAB
J Brindza, J Szweda, Q Liao, Y Jiang, A Striegel
2009 39th IEEE Frontiers in Education Conference, 1-6, 2009
Bridging the gap of network management and anomaly detection through interactive visualization
T Zhang, Q Liao, L Shi
2014 IEEE Pacific Visualization Symposium, 253-257, 2014
Visual analysis of large-scale network anomalies
Q Liao, L Shi, C Wang
IBM Journal of Research and Development 57 (3/4), 13: 1-13: 12, 2013
ENAVis: Enterprise Network Activities Visualization.
Q Liao, A Blaich, A Striegel, D Thain
LISA, 59-74, 2008
Managing networks through context: Graph visualization and exploration
Q Liao, A Blaich, D VanBruggen, A Striegel
Computer Networks 54 (16), 2809-2824, 2010
Portfolio optimization of computer and mobile botnets
Q Liao, Z Li
International Journal of Information Security 13 (1), 1-14, 2014
Adversarial machine learning for spam filters
B Kuchipudi, RT Nannapaneni, Q Liao
Proceedings of the 15th International Conference on Availability …, 2020
Intelligent network management using graph differential anomaly visualization
Q Liao, A Striegel
2012 IEEE Network Operations and Management Symposium, 1008-1014, 2012
User password repetitive patterns analysis and visualization
X Yu, Q Liao
Information & Computer Security, 2016
Analysis of offense tactics of basketball games using link prediction
T Zhang, G Hu, Q Liao
2013 IEEE/ACIS 12th International Conference on Computer and Information …, 2013
Using selective, short‐term memory to improve resilience against DDoS exhaustion attacks
Q Liao, DA Cieslak, AD Striegel, NV Chawla
Security and Communication Networks 1 (4), 287-299, 2008
Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling ransomware
Z Li, Q Liao
Proceedings of the 15th International Conference on Availability …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20