BibTeX records: Lunquan Li

download as .bib file

@article{DBLP:journals/compsec/ChoiLLK10,
  author    = {Yoon{-}Ho Choi and
               Lunquan Li and
               Peng Liu and
               George Kesidis},
  title     = {Worm virulence estimation for the containment of local worm outbreak},
  journal   = {Comput. Secur.},
  volume    = {29},
  number    = {1},
  pages     = {104--123},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.cose.2009.07.002},
  doi       = {10.1016/j.cose.2009.07.002},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/ChoiLLK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JhiLLGJK10,
  author    = {Yoon{-}chan Jhi and
               Peng Liu and
               Lunquan Li and
               Qijun Gu and
               Jiwu Jing and
               George Kesidis},
  title     = {{PWC:} a proactive worm containment solution for enterprise networks},
  journal   = {Secur. Commun. Networks},
  volume    = {3},
  number    = {4},
  pages     = {334--354},
  year      = {2010},
  url       = {https://doi.org/10.1002/sec.112},
  doi       = {10.1002/sec.112},
  timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/scn/JhiLLGJK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiLK08,
  author    = {Lunquan Li and
               Peng Liu and
               George Kesidis},
  title     = {Threshold Smart Walk for the Containment of Local Worm Outbreak},
  booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
               2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages     = {2124--2128},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/GLOCOM.2008.ECP.409},
  doi       = {10.1109/GLOCOM.2008.ECP.409},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/globecom/LiLK08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Wang0L07,
  author    = {Alex Hai Wang and
               Peng Liu and
               Lunquan Li},
  title     = {Evaluating the survivability of Intrusion Tolerant Database systems
               and the impact of intrusion detection deficiencies},
  journal   = {Int. J. Inf. Comput. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {315--340},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJICS.2007.013958},
  doi       = {10.1504/IJICS.2007.013958},
  timestamp = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijics/Wang0L07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JhiLLGJK07,
  author    = {Yoon{-}chan Jhi and
               Peng Liu and
               Lunquan Li and
               Qijun Gu and
               Jiwu Jing and
               George Kesidis},
  title     = {{PWC:} {A} proactive worm containment solution for enterprise networks},
  booktitle = {Third International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
               2007},
  pages     = {433--442},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {https://doi.org/10.1109/SECCOM.2007.4550364},
  doi       = {10.1109/SECCOM.2007.4550364},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/securecomm/JhiLLGJK07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Li0JK07,
  author    = {Lunquan Li and
               Peng Liu and
               Yoon{-}chan Jhi and
               George Kesidis},
  editor    = {Terry V. Benzel and
               George Kesidis},
  title     = {Evaluation of Collaborative Worm Containments on {DETER} Testbed},
  booktitle = {{DETER} Community Workshop on Cyber Security Experimentation and Test
               2007, Boston, Ma, USA, August 6-7, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/conference/deter-2007/evaluation-collaborative-worm-containments-deter-testbed},
  timestamp = {Mon, 01 Feb 2021 08:43:10 +0100},
  biburl    = {https://dblp.org/rec/conf/uss/Li0JK07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuWL06,
  author    = {Peng Liu and
               Alex Hai Wang and
               Lunquan Li},
  title     = {Real-time data attack isolation for commercial database applications},
  journal   = {J. Netw. Comput. Appl.},
  volume    = {29},
  number    = {4},
  pages     = {294--320},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jnca.2005.03.001},
  doi       = {10.1016/j.jnca.2005.03.001},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnca/LiuWL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LiLK06,
  author    = {Lunquan Li and
               Peng Liu and
               George Kesidis},
  editor    = {William Yurcik and
               Stefan Axelsson and
               Kiran Lakkaraju and
               Soon Tee Teoh},
  title     = {Visual toolkit for network security experiment specification and data
               analysis},
  booktitle = {3rd International Workshop on Visualization for Computer Security,
               VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages     = {7--14},
  publisher = {{ACM}},
  year      = {2006},
  url       = {https://doi.org/10.1145/1179576.1179579},
  doi       = {10.1145/1179576.1179579},
  timestamp = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl    = {https://dblp.org/rec/conf/vizsec/LiLK06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/LiuJLWLI04,
  author    = {Peng Liu and
               Jiwu Jing and
               Pramote Luenam and
               Ying Wang and
               Lunquan Li and
               Supawadee Ingsriswang},
  title     = {The Design and Implementation of a Self-Healing Database System},
  journal   = {J. Intell. Inf. Syst.},
  volume    = {23},
  number    = {3},
  pages     = {247--269},
  year      = {2004},
  url       = {https://doi.org/10.1023/B:JIIS.0000047394.02444.8d},
  doi       = {10.1023/B:JIIS.0000047394.02444.8d},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jiis/LiuJLWLI04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangLL04,
  author    = {Alex Hai Wang and
               Peng Liu and
               Lunquan Li},
  editor    = {Kan Zhang and
               Yuliang Zheng},
  title     = {Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness
               of Attack Recovery},
  booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo
               Alto, CA, USA, September 27-29, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3225},
  pages     = {146--157},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30144-8\_13},
  doi       = {10.1007/978-3-540-30144-8\_13},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/isw/WangLL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics