Botnet economics: uncertainty matters Z Li, Q Liao, A Striegel Managing information risk and the economics of security, 245-267, 2009 | 110 | 2009 |
RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning CD Mano, A Blaich, Q Liao, Y Jiang, DA Cieslak, DC Salyers, A Striegel ACM Transactions on Information and System Security (TISSEC) 11 (2), 1-23, 2008 | 72 | 2008 |
1.5 D egocentric dynamic network visualization L Shi, C Wang, Z Wen, H Qu, C Lin, Q Liao IEEE transactions on visualization and computer graphics 21 (5), 624-637, 2014 | 58 | 2014 |
Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets Z Li, Q Liao Government Information Quarterly 35 (1), 151-160, 2018 | 53 | 2018 |
Visualizing graph dynamics and similarity for enterprise network security and management Q Liao, A Striegel, N Chawla Proceedings of the seventh international symposium on visualization for …, 2010 | 52 | 2010 |
SAVE: Sensor anomaly visualization engine L Shi, Q Liao, Y He, R Li, A Striegel, Z Su 2011 IEEE Conference on Visual Analytics Science and Technology (VAST), 201-210, 2011 | 48 | 2011 |
Hierarchical focus+ context heterogeneous network visualization L Shi, Q Liao, H Tong, Y Hu, Y Zhao, C Lin 2014 IEEE Pacific visualization symposium, 89-96, 2014 | 39 | 2014 |
Adversarial machine learning for spam filters B Kuchipudi, RT Nannapaneni, Q Liao Proceedings of the 15th International Conference on Availability …, 2020 | 36 | 2020 |
Scalable network traffic visualization using compressed graphs L Shi, Q Liac, X Sun, Y Chen, C Lin 2013 IEEE International Conference on Big Data, 606-612, 2013 | 36 | 2013 |
Bridging the gap of network management and anomaly detection through interactive visualization T Zhang, Q Liao, L Shi 2014 IEEE Pacific Visualization Symposium, 253-257, 2014 | 31 | 2014 |
WiiLab: bringing together the Nintendo Wiimote and MATLAB J Brindza, J Szweda, Q Liao, Y Jiang, A Striegel 2009 39th IEEE Frontiers in Education Conference, 1-6, 2009 | 30 | 2009 |
Visual analysis of large-scale network anomalies Q Liao, L Shi, C Wang IBM Journal of Research and Development 57 (3/4), 13: 1-13: 12, 2013 | 26 | 2013 |
Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling ransomware Z Li, Q Liao Proceedings of the 15th International Conference on Availability …, 2020 | 20 | 2020 |
ENAVis: Enterprise Network Activities Visualization. Q Liao, A Blaich, A Striegel, D Thain LISA, 59-74, 2008 | 20 | 2008 |
Game Theory of Data-selling Ransomware. Z Li, Q Liao J. Cyber Secur. Mobil. 10 (1), 65-96, 2021 | 18 | 2021 |
Managing networks through context: Graph visualization and exploration Q Liao, A Blaich, D VanBruggen, A Striegel Computer Networks 54 (16), 2809-2824, 2010 | 18 | 2010 |
Preventive portfolio against data-selling ransomware—A game theory of encryption and deception Z Li, Q Liao Computers & Security 116, 102644, 2022 | 15 | 2022 |
Portfolio optimization of computer and mobile botnets Q Liao, Z Li International Journal of Information Security 13, 1-14, 2014 | 15 | 2014 |
Intelligent network management using graph differential anomaly visualization Q Liao, A Striegel 2012 IEEE Network Operations and Management Symposium, 1008-1014, 2012 | 14 | 2012 |
User password repetitive patterns analysis and visualization X Yu, Q Liao Information & Computer Security 24 (1), 93-115, 2016 | 13 | 2016 |