2009 |
13 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
The implementation and evaluation of a recovery system for workflows.
J. Network and Computer Applications 32(1): 158-183 (2009) |
2007 |
12 | EE | Meng Yu,
Wanyu Zang,
Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks.
ACSAC 2007: 97-106 |
11 | EE | Meng Yu,
Wanyu Zang,
Barbara Reagor:
Decentralized Trust Management based on the Reputation of Information Sources.
ICNSC 2007: 212-217 |
10 | EE | Meng Yu,
Peng Liu,
Wanyu Zang,
Sushil Jajodia:
Trusted Recovery.
Secure Data Management in Decentralized Systems 2007: 59-94 |
2006 |
9 | EE | Wanyu Zang,
Meng Yu:
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.
ICISS 2006: 289-302 |
2005 |
8 | EE | Meng Yu,
Wanyu Zang,
Peng Liu:
Defensive Execution of Transactional Processes against Attacks.
ACSAC 2005: 515-526 |
7 | EE | Peng Liu,
Wanyu Zang,
Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) |
6 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations.
Journal of Computer Security 13(4): 623-658 (2005) |
2004 |
5 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
Self-Healing Workflow Systems under Attacks.
ICDCS 2004: 418-425 |
2003 |
4 | EE | Peng Liu,
Wanyu Zang:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Conference on Computer and Communications Security 2003: 179-189 |
3 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
Multi-Version Attack Recovery for Workflow System.
ACSAC 2003: 142-151 |
2 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations.
SEC 2003: 229-240 |
2002 |
1 | | Meng Yu,
Minyi Guo,
Yi Pan,
Wanyu Zang,
Li Xie:
JAPS-II: A Source to Source Parallelizing Compiler for Java.
PDPTA 2002: 164-170 |