Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Van Brussel, H.
Dan Graur
Tyme Suda
Barbara Aquilani
Maximilian Dürr
Jhonathan Pinzon
Zhiqiang Liu
Liangliang Shang
Chen Ma
Home
/
Author
/
ALEXEI LISITSA
Author Info
Open Visualization
Name
Affiliation
Papers
ALEXEI LISITSA
Computer Science Department, University of Liverpool, Ashton Building, Ashton Street, Liverpool, L69 3BX, UK. Lisitsa@liverpool.ac.uk/ Potapov@liverpool.ac.uk
76
Collaborators
Citations
PageRank
70
272
45.94
Referers
Referees
References
400
788
586
Search Limit
100
788
Publications (76 rows)
Collaborators (70 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Making Sense of Heterogeneous Maritime Data
0
0.34
2022
Matrix profile for DDoS attacks detection
1
0.35
2021
An Overview Of Verification And Validation Challenges For Inspection Robots
0
0.34
2021
Release-Aware Encryption Adjustment Query processing for Document Database
0
0.34
2020
Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations.
0
0.34
2019
Querying Encrypted Data in Graph Databases.
0
0.34
2019
Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database.
0
0.34
2019
Revisiting Mu-Puzzle. A Case Study In Finite Countermodels Verification
0
0.34
2018
Poster: Agent-based (BDI) modeling for automation of penetration testing.
0
0.34
2018
Towards Human Readability of Automated Unknottedness Proofs.
0
0.34
2018
Traversal-aware Encryption Adjustment for Graph Databases.
0
0.34
2018
Clarification of Ambiguity for the Simple Authentication and Security Layer.
0
0.34
2018
A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy
0
0.34
2018
The Andrews-Curtis Conjecture, Term Rewriting and First-Order Proofs.
0
0.34
2018
Automated Reasoning for Knot Semigroups and \pi π -orbifold Groups of Knots.
0
0.34
2017
Verification Of Programs Via Intermediate Interpretation
0
0.34
2017
Attribute Permutation Steganography Detection Using Attribute Position Changes Count
0
0.34
2017
On the mining and usage of Movement Patterns in large traffic networks
1
0.35
2017
User-to-User Recommendation using the Concept of Movement Patterns: A Study using a Dating Social Network.
0
0.34
2017
Abstract State Machines and System Theoretic Process Analysis for Safety-Critical Systems.
0
0.34
2017
Automated verification of programs and Web systems
1
0.36
2016
Mining Frequent Movement Patterns in Large Networks: A Parallel Approach Using Shapes.
0
0.34
2016
Proceedings of the Fourth International Workshop on Verification and Program Transformation.
0
0.34
2016
A Statistical Approach to the Detection of HTML Attribute Permutation Steganography.
0
0.34
2016
Efficient Knot Discrimination via Quandle Coloring with SAT and #-SAT.
0
0.34
2016
First-order logic for safety verification of hedge rewriting systems.
0
0.34
2015
A combinatorial approach to knot recognition
1
0.48
2015
Finite Countermodel Based Verification For Program Transformation (A Case Study)
0
0.34
2015
Optimized Neural Incremental Attribute Learning For Classification Based On Statistical Discriminability
0
0.34
2014
Computer-aided proof of Erdos discrepancy properties
10
0.57
2014
A SAT Attack on the Erdős Discrepancy Conjecture.
6
0.59
2014
A Note on Program Specialization. What Syntactical Properties of Residual Programs Can Reveal?
2
0.38
2014
The 'representative' metaheuristic design pattern
0
0.34
2014
Finite Reasons for Safety - Parameterized Verification by Finite Model Finding.
0
0.34
2013
Autonomous Asteroid Exploration by Rational Agents
2
0.41
2013
Cryptographic Protocol Verification via Supercompilation (A Case Study).
3
0.42
2013
Practical Verification of Decision-Making in Agent-Based Autonomous Systems.
20
0.93
2013
First-order theorem proving in the exploration of Andrews-Curtis conjecture.
2
0.42
2013
Finite Models vs Tree Automata in Safety Verification.
3
0.39
2012
A misuse-based network Intrusion Detection System using Temporal Logic and stream processing.
2
0.39
2011
Finite countermodels for safety verification of parameterized tree systems
2
0.37
2011
Temporal Access to the Iteration Sequences: A Unifying Approach to Fixed Point Logics
0
0.34
2011
First-order finite satisfiability vs tree automata in safety verification
0
0.34
2011
Planarity of knots, register automata and logspace computability
1
0.39
2011
On one application of computations with oracle
2
0.41
2010
Finite countermodels as invariants. A case study in verification of parameterized mutual exclusion protocol.
2
0.42
2010
Reachability as derivability, finite countermodels and verification
0
0.34
2010
Declarative abstractions for agent based hybrid control systems
6
0.51
2010
An agent based framework for adaptive control and decision making of autonomous vehicles.
3
0.42
2010
Finite Model Finding for Parameterized Verification
3
0.44
2010
1
2
50 / page