Follow
Changwei Liu
Changwei Liu
Accenture Cyber Lab
Verified email at accenture.com
Title
Cited by
Cited by
Year
Fighting unicode-obfuscated spam
C Liu, S Stamm
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
542007
Using attack graphs in forensic examinations
C Liu, A Singhal, D Wijesekera
2012 Seventh International Conference on Availability, Reliability and …, 2012
462012
Identifying evidence for cloud forensic analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
312017
A logic-based network forensic model for evidence analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015
302015
Mapping evidence graphs to attack graphs
C Liu, A Singhal, D Wijesekera
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
252012
Creating integrated evidence graphs for network forensics
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013
182013
A probabilistic network forensic model for evidence analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XII: 12th IFIP WG 11.9 International …, 2016
112016
A Model Towards Using Evidence from Security Events for Network Attack Analysis.
C Liu, A Singhal, D Wijesekera
WOSIS, 83-95, 2014
112014
Relating admissibility standards for digital evidence to attack scenario reconstruction
C Liu, A Singhal, D Wijesekera
Journal of Digital Forensics, Security and Law 9 (2), 15, 2014
102014
Forensic analysis of advanced persistent threat attacks in cloud environments
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International …, 2020
82020
A layered graphical model for mission attack impact analysis
C Liu, A Singhal, D Wijesekera
2017 IEEE Conference on Communications and Network Security (CNS), 602-609, 2017
72017
Methodology for enabling forensic analysis using hypervisor vulnerabilities data
R Chandramouli, R Chandramouli, A Singhal, D Wijesekera, C Liu
US Department of Commerce, National Institute of Standards and Technology, 2019
62019
A layered graphical model for cloud forensic mission attack impact analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International …, 2018
62018
Poster: A Logic Based Network Forensics Model for Evidence Analysis
A Singhal, C Liu, D Wijesekara
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
42015
IDENTIFYING AND CORRECTING VULNERABILITIES IN MACHINE LEARNING MODELS
C Liu, L DiValentine, N Liberman, A Hass, B McCarty
22022
A probabilistic logic programming based model for network forensics
C Liu
George Mason University, 2015
22015
Determining the Forensic Data Requirements for Investigating Hypervisor Attacks
C Liu, A Singhal, R Chandramouli, D Wijesekera
Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019
12019
A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks
R Chandramouli, A Singhal, D Wijesekera, C Liu
National Institute of Standards and Technology, 2018
12018
DATA AUTHENTICATION AND VALIDATION ACROSS MULTIPLE SOURCES, INTERFACES, AND NETWORKS
BG Mccarty, C Liu
US Patent App. 18/053,553, 2024
2024
Build a Computationally Efficient Strong Defense against Adversarial Example Attacks
MBS Changwei Liu, Louis DiValentin, Aolin Ding
ICISSP, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20