关注
Changwei Liu
Changwei Liu
Accenture Cyber Lab
在 accenture.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fighting unicode-obfuscated spam
C Liu, S Stamm
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
542007
Using attack graphs in forensic examinations
C Liu, A Singhal, D Wijesekera
2012 Seventh International Conference on Availability, Reliability and …, 2012
472012
Identifying evidence for cloud forensic analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
322017
A logic-based network forensic model for evidence analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015
302015
Mapping evidence graphs to attack graphs
C Liu, A Singhal, D Wijesekera
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
252012
Creating integrated evidence graphs for network forensics
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013
182013
A probabilistic network forensic model for evidence analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XII: 12th IFIP WG 11.9 International …, 2016
112016
A Model Towards Using Evidence from Security Events for Network Attack Analysis.
C Liu, A Singhal, D Wijesekera
WOSIS, 83-95, 2014
112014
Relating admissibility standards for digital evidence to attack scenario reconstruction
C Liu, A Singhal, D Wijesekera
Journal of Digital Forensics, Security and Law 9 (2), 15, 2014
102014
Forensic analysis of advanced persistent threat attacks in cloud environments
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International …, 2020
82020
A layered graphical model for mission attack impact analysis
C Liu, A Singhal, D Wijesekera
2017 IEEE Conference on Communications and Network Security (CNS), 602-609, 2017
82017
Methodology for enabling forensic analysis using hypervisor vulnerabilities data
R Chandramouli, R Chandramouli, A Singhal, D Wijesekera, C Liu
US Department of Commerce, National Institute of Standards and Technology, 2019
62019
A layered graphical model for cloud forensic mission attack impact analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International …, 2018
62018
IDENTIFYING AND CORRECTING VULNERABILITIES IN MACHINE LEARNING MODELS
C Liu, L DiValentine, N Liberman, A Hass, B McCarty
42022
Poster: A Logic Based Network Forensics Model for Evidence Analysis
A Singhal, C Liu, D Wijesekara
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
42015
Determining the Forensic Data Requirements for Investigating Hypervisor Attacks
C Liu, A Singhal, R Chandramouli, D Wijesekera
Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019
22019
A probabilistic logic programming based model for network forensics
C Liu
George Mason University, 2015
22015
A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks
R Chandramouli, A Singhal, D Wijesekera, C Liu
National Institute of Standards and Technology, 2018
12018
Identifying and assessing costs associated with correcting vulnerabilities in machine learning models
A Hassanzadeh, C Liu, L Divalentin, BG McCarty
US Patent App. 18/054,710, 2024
2024
Data authentication and validation across multiple sources, interfaces, and networks
BG McCarty, C Liu
US Patent App. 18/053,553, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20