General

Yuling Liu  

professor

Email: liuyuling@iie.ac.cn



Research Areas

Cyber security situation awareness,network security big data analysis,network security evaluation

Education

2006-09--2013-06   Institute of Software, Chinese Academy of Sciences  Phd


Experience

   
Work Experience
2006-09--2013-06   Institute of Software, Chinese Academy of Sciences  Assistant Professor

Publications

   
Papers

(1) Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis, Security and Communication Networks, 2018
(2) New Insights into approaches to evaluating intention and path for network multistep attacks, Mathematical Problems in Engineering, 2018
(3) Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game, IEEE Access, 2018
(4) Visual Cryptography Based Multilevel Protection Scheme for Visualization of Network Security Situation, Procedia Computer Science, 2018
(5)Route Prediction Method for Network Intrusion Using Absorbing Markov Chain, Journal of Computer Research and Development, 2018
(6) Vulnerability life cycle oriented security risk metric method, Journal of Software, 2018
(7) Quantitative method for network security situation based on attack prediction, Journal on Communications, 2017
(8) Quantitative Method for Network Security Situation Based on Attack Prediction, Security and Communication Networks, 2017
(9) Research survey of network security situation awareness, Computer Engineering and Applications, 2017
(10) A Multi-dimensional Vector Based Access Control Model for Social Networks, ASSIT 2016, 2016
(11) A Lattice-Based Access Control Model for Social Networks, Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2016
(12) Network security situational awareness method based on capability-opportunity-intent model, Application Research of Computers, 2016
(13) Compound Approach for Sybil Users Detection in Social Networks, Computer Science, 2016
(14) Cloud Security Situation Awareness Method Based on Gray Theory, The 4th Information Security Classified Protection Technology Conference, 2015
(15) Method of DDoS Countermeasure Selection Based on Multi-Attribute Decision Making, Journal of Software, 2015
(16) Network Situation Prediction Method Based on Spatial-Time Dimension Analysis, Journal of Computer Research and Development, 2014
(17) UML-Based Modeling Method of Network Security Infrastructure, Journal of Computer Research and Development, 2014
(18) Timing-based clone detection on Android markets, International Conference on Security and Privacy in Communication Systems, 2014
(19) A game theory based approach to the generation of optimal ddos defending strategy, The International Conference on Computer Security and Digital Investigation (ComSec2014), 2014
(20) Optimal defense strategies for DDoS defender using bayesian game model, International Conference on Information Security Practice and Experience, 2013
(21) A security threat identification and analysis method based on atack graph, Chinese Journal of Computers, 2012
(22) Performance Evaluation of Worm Attack and Defense Strategies Based on Static Bayesian Game, Journal of Software, 2012
(23) IoT security  evaluation method based on data fusion, The First National Conference on Information Classified Protection Assessment System, 2011


Patents

( 1 ) Two-dimensional code secure mobile payment method and system, 2018, Patent No: 201810164260.0
( 2 ) Multi-level access control method and system based on multi-secret visual password, 2018,Patent No: 2018101619214
( 3 ) A virtual machine dynamic migration method based on resource classification, 2017, Patent No: 201710582510.8
( 4 ) Malicious cloud tenant identification method and device based on neural network, 2017, Patent No: 201711328420.2
( 5 ) Social network access control method based on user characteristics, 2015, Patent No: 2015101728044
( 6 ) A method for selecting the best defense strategy for network security, 2012, Patent No: 201010033849.0
( 7 )A Method for Network Intrusion Situation Intention Evaluation Based on Alarm Fusion, 2018, Patent No: 201810594522.7
( 8 ) Network optimal defense strategy selection method and device based on bounded rational game theory, 2018, Patent No: 201810594522.9

Students

现指导学生

闫楚依  博士研究生  083900-网络空间安全  

李堉  硕士研究生  083900-网络空间安全  

宋泽楷  硕士研究生  083900-网络空间安全  

赵昌志  博士研究生  083900-网络空间安全  

曹奕阳  博士研究生  083900-网络空间安全  

陈扬帆  博士研究生  083900-网络空间安全  

黄昊  博士研究生  083900-网络空间安全  

李林旭  博士研究生  083900-网络空间安全  

陈羽凡  博士研究生  083900-网络空间安全  

曹雅琴  博士研究生  083900-网络空间安全  

赵勇  硕士研究生  083900-网络空间安全  

毕炳晟  硕士研究生  083900-网络空间安全  

赵诗武  硕士研究生  083900-网络空间安全  

黄铭宇  硕士研究生  083900-网络空间安全  

朱凯  硕士研究生  085400-电子信息  

冯睿智  硕士研究生  085400-电子信息  

李浩宇  硕士研究生  085400-电子信息