Fighting unicode-obfuscated spam C Liu, S Stamm Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007 | 54 | 2007 |
Using attack graphs in forensic examinations C Liu, A Singhal, D Wijesekera 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 47 | 2012 |
Identifying evidence for cloud forensic analysis C Liu, A Singhal, D Wijesekera Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017 | 32 | 2017 |
A logic-based network forensic model for evidence analysis C Liu, A Singhal, D Wijesekera Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015 | 30 | 2015 |
Mapping evidence graphs to attack graphs C Liu, A Singhal, D Wijesekera 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 25 | 2012 |
Creating integrated evidence graphs for network forensics C Liu, A Singhal, D Wijesekera Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013 | 18 | 2013 |
A probabilistic network forensic model for evidence analysis C Liu, A Singhal, D Wijesekera Advances in Digital Forensics XII: 12th IFIP WG 11.9 International …, 2016 | 11 | 2016 |
A Model Towards Using Evidence from Security Events for Network Attack Analysis. C Liu, A Singhal, D Wijesekera WOSIS, 83-95, 2014 | 11 | 2014 |
Relating admissibility standards for digital evidence to attack scenario reconstruction C Liu, A Singhal, D Wijesekera Journal of Digital Forensics, Security and Law 9 (2), 15, 2014 | 10 | 2014 |
Forensic analysis of advanced persistent threat attacks in cloud environments C Liu, A Singhal, D Wijesekera Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International …, 2020 | 8 | 2020 |
A layered graphical model for mission attack impact analysis C Liu, A Singhal, D Wijesekera 2017 IEEE Conference on Communications and Network Security (CNS), 602-609, 2017 | 8 | 2017 |
Methodology for enabling forensic analysis using hypervisor vulnerabilities data R Chandramouli, R Chandramouli, A Singhal, D Wijesekera, C Liu US Department of Commerce, National Institute of Standards and Technology, 2019 | 6 | 2019 |
A layered graphical model for cloud forensic mission attack impact analysis C Liu, A Singhal, D Wijesekera Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International …, 2018 | 6 | 2018 |
IDENTIFYING AND CORRECTING VULNERABILITIES IN MACHINE LEARNING MODELS C Liu, L DiValentine, N Liberman, A Hass, B McCarty | 4 | 2022 |
Poster: A Logic Based Network Forensics Model for Evidence Analysis A Singhal, C Liu, D Wijesekara Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 4 | 2015 |
Determining the Forensic Data Requirements for Investigating Hypervisor Attacks C Liu, A Singhal, R Chandramouli, D Wijesekera Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019 | 2 | 2019 |
A probabilistic logic programming based model for network forensics C Liu George Mason University, 2015 | 2 | 2015 |
A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks R Chandramouli, A Singhal, D Wijesekera, C Liu National Institute of Standards and Technology, 2018 | 1 | 2018 |
Identifying and assessing costs associated with correcting vulnerabilities in machine learning models A Hassanzadeh, C Liu, L Divalentin, BG McCarty US Patent App. 18/054,710, 2024 | | 2024 |
Data authentication and validation across multiple sources, interfaces, and networks BG McCarty, C Liu US Patent App. 18/053,553, 2024 | | 2024 |