Name
Affiliation
Papers
ALEXEI LISITSA
Computer Science Department, University of Liverpool, Ashton Building, Ashton Street, Liverpool, L69 3BX, UK. Lisitsa@liverpool.ac.uk/ Potapov@liverpool.ac.uk
76
Collaborators
Citations 
PageRank 
70
272
45.94
Referers 
Referees 
References 
400
788
586
Search Limit
100788
Title
Citations
PageRank
Year
Making Sense of Heterogeneous Maritime Data00.342022
Matrix profile for DDoS attacks detection10.352021
An Overview Of Verification And Validation Challenges For Inspection Robots00.342021
Release-Aware Encryption Adjustment Query processing for Document Database00.342020
Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations.00.342019
Querying Encrypted Data in Graph Databases.00.342019
Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database.00.342019
Revisiting Mu-Puzzle. A Case Study In Finite Countermodels Verification00.342018
Poster: Agent-based (BDI) modeling for automation of penetration testing.00.342018
Towards Human Readability of Automated Unknottedness Proofs.00.342018
Traversal-aware Encryption Adjustment for Graph Databases.00.342018
Clarification of Ambiguity for the Simple Authentication and Security Layer.00.342018
A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy00.342018
The Andrews-Curtis Conjecture, Term Rewriting and First-Order Proofs.00.342018
Automated Reasoning for Knot Semigroups and \pi π -orbifold Groups of Knots.00.342017
Verification Of Programs Via Intermediate Interpretation00.342017
Attribute Permutation Steganography Detection Using Attribute Position Changes Count00.342017
On the mining and usage of Movement Patterns in large traffic networks10.352017
User-to-User Recommendation using the Concept of Movement Patterns: A Study using a Dating Social Network.00.342017
Abstract State Machines and System Theoretic Process Analysis for Safety-Critical Systems.00.342017
Automated verification of programs and Web systems10.362016
Mining Frequent Movement Patterns in Large Networks: A Parallel Approach Using Shapes.00.342016
Proceedings of the Fourth International Workshop on Verification and Program Transformation.00.342016
A Statistical Approach to the Detection of HTML Attribute Permutation Steganography.00.342016
Efficient Knot Discrimination via Quandle Coloring with SAT and #-SAT.00.342016
First-order logic for safety verification of hedge rewriting systems.00.342015
A combinatorial approach to knot recognition10.482015
Finite Countermodel Based Verification For Program Transformation (A Case Study)00.342015
Optimized Neural Incremental Attribute Learning For Classification Based On Statistical Discriminability00.342014
Computer-aided proof of Erdos discrepancy properties100.572014
A SAT Attack on the Erdős Discrepancy Conjecture.60.592014
A Note on Program Specialization. What Syntactical Properties of Residual Programs Can Reveal?20.382014
The 'representative' metaheuristic design pattern00.342014
Finite Reasons for Safety - Parameterized Verification by Finite Model Finding.00.342013
Autonomous Asteroid Exploration by Rational Agents20.412013
Cryptographic Protocol Verification via Supercompilation (A Case Study).30.422013
Practical Verification of Decision-Making in Agent-Based Autonomous Systems.200.932013
First-order theorem proving in the exploration of Andrews-Curtis conjecture.20.422013
Finite Models vs Tree Automata in Safety Verification.30.392012
A misuse-based network Intrusion Detection System using Temporal Logic and stream processing.20.392011
Finite countermodels for safety verification of parameterized tree systems20.372011
Temporal Access to the Iteration Sequences: A Unifying Approach to Fixed Point Logics00.342011
First-order finite satisfiability vs tree automata in safety verification00.342011
Planarity of knots, register automata and logspace computability10.392011
On one application of computations with oracle20.412010
Finite countermodels as invariants. A case study in verification of parameterized mutual exclusion protocol.20.422010
Reachability as derivability, finite countermodels and verification00.342010
Declarative abstractions for agent based hybrid control systems60.512010
An agent based framework for adaptive control and decision making of autonomous vehicles.30.422010
Finite Model Finding for Parameterized Verification30.442010
  • 1
  • 2