A data mining approach for database intrusion detection Y Hu, B Panda Proceedings of the 2004 ACM symposium on Applied computing, 711-716, 2004 | 257 | 2004 |
Identification of malicious transactions in database systems Y Hu, B Panda Seventh International Database Engineering and Applications Symposium, 2003 …, 2003 | 105 | 2003 |
Insider threat in database systems: Preventing malicious users' activities in databases M Chagarlamudi, B Panda, Y Hu 2009 Sixth International Conference on Information Technology: New …, 2009 | 45 | 2009 |
Reversible data hiding in homomorphically encrypted image using interpolation technique A Malik, H Wang, T Chen, T Yang, AN Khan, H Wu, Y Chen, Y Hu Journal of Information Security and Applications 48, 102374, 2019 | 29 | 2019 |
Design and analysis of techniques for detection of malicious activities in database systems Y Hu, B Panda Journal of Network and Systems Management 13, 269-291, 2005 | 28 | 2005 |
Penetration testing in a box L Epling, B Hinkel, Y Hu Proceedings of the 2015 information security curriculum development …, 2015 | 27 | 2015 |
Detecting collaborative insider attacks in information systems K Viet, B Panda, Y Hu 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2012 | 19 | 2012 |
Mining inter-transaction data dependencies for database intrusion detection Y Hu, B Panda Innovations and advances in computer sciences and engineering, 67-72, 2010 | 18 | 2010 |
A dual fragile watermarking scheme for speech authentication Q Qian, HX Wang, Y Hu, LN Zhou, JF Li Multimedia Tools and Applications 75, 13431-13450, 2016 | 17 | 2016 |
Profiling file repository access patterns for identifying data exfiltration activities Y Hu, C Frank, J Walden, E Crawford, D Kasturiratna 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011 | 17 | 2011 |
An agent based approach to perform damage assessment and recovery efficiently after a cyber attack to ensure E-government database security K Kurra, B Panda, WN Li, Y Hu 2015 48th Hawaii International Conference on System Sciences, 2272-2279, 2015 | 15 | 2015 |
An effective log mining approach for database intrusion detection Y Hu, A Campan, J Walden, I Vorobyeva, J Shelton 2010 IEEE International Conference on Systems, Man and Cybernetics, 2299-2306, 2010 | 14 | 2010 |
The usability of end user cryptographic products M Sweikata, G Watson, C Frank, C Christensen, Y Hu 2009 Information Security Curriculum Development Conference, 55-59, 2009 | 11 | 2009 |
Intra-frame error concealment scheme using 3D reversible data hiding in mobile cloud environment YL Chen, H Wang, Y Hu, A Malik IEEE Access 6, 77004-77013, 2018 | 10 | 2018 |
Modeling deceptive information dissemination using a holistic approach Y Hu, Z Xiao, B Panda Proceedings of the 2007 ACM symposium on Applied computing, 1591-1598, 2007 | 10 | 2007 |
Succinct and fast accessible data structures for database damage assessment J Zhou, B Panda, Y Hu International Conference on Distributed Computing and Internet Technology …, 2004 | 10 | 2004 |
Mining data relationships for database damage assessment in a post information warfare scenario Y Hu, B Panda Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 10 | 2004 |
A novel NMF-based authentication scheme for encrypted speech in cloud computing C Shi, H Wang, Y Hu, X Li Multimedia Tools and Applications 80 (17), 25773-25798, 2021 | 9 | 2021 |
A speech homomorphic encryption scheme with less data expansion in cloud computing C Shi, H Wang, Y Hu, Q Qian, H Zhao KSII Transactions on Internet and Information Systems (TIIS) 13 (5), 2588-2609, 2019 | 8 | 2019 |
A log independent distributed database damage assessment model J Zhou, B Panda, Y Hu Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005 | 8 | 2005 |