| 2009 |
14 | | Wanyu Zang,
Qijun Gu,
Meng Yu,
Peng Liu:
An Attack-Resilient Channel Assignment MAC Protocol.
NBiS 2009: 246-253 |
13 | | Meng Yu,
Peng Liu,
Wanyu Zang:
The implementation and evaluation of a recovery system for workflows.
J. Network and Computer Applications 32(1): 158-183 (2009) |
| 2007 |
12 | | Meng Yu,
Wanyu Zang,
Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks.
ACSAC 2007: 97-106 |
11 | | Meng Yu,
Wanyu Zang,
Barbara Reagor:
Decentralized Trust Management based on the Reputation of Information Sources.
ICNSC 2007: 212-217 |
10 | | Meng Yu,
Peng Liu,
Wanyu Zang,
Sushil Jajodia:
Trusted Recovery.
Secure Data Management in Decentralized Systems 2007: 59-94 |
| 2006 |
9 | | Wanyu Zang,
Meng Yu:
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.
ICISS 2006: 289-302 |
| 2005 |
8 | | Meng Yu,
Wanyu Zang,
Peng Liu:
Defensive Execution of Transactional Processes against Attacks.
ACSAC 2005: 515-526 |
7 | | Peng Liu,
Wanyu Zang,
Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) |
6 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations.
Journal of Computer Security 13(4): 623-658 (2005) |
| 2004 |
5 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Self-Healing Workflow Systems under Attacks.
ICDCS 2004: 418-425 |
| 2003 |
4 | | Peng Liu,
Wanyu Zang:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Conference on Computer and Communications Security 2003: 179-189 |
3 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Multi-Version Attack Recovery for Workflow System.
ACSAC 2003: 142-151 |
2 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations.
SEC 2003: 229-240 |
| 2002 |
1 | | Meng Yu,
Minyi Guo,
Yi Pan,
Wanyu Zang,
Li Xie:
JAPS-II: A Source to Source Parallelizing Compiler for Java.
PDPTA 2002: 164-170 |