Follow
Changwei Liu
Changwei Liu
Accenture Cyber Lab
Verified email at accenture.com
Title
Cited by
Cited by
Year
Fighting unicode-obfuscated spam
C Liu, S Stamm
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
542007
Using attack graphs in forensic examinations
C Liu, A Singhal, D Wijesekera
2012 Seventh International Conference on Availability, Reliability and …, 2012
462012
Identifying evidence for cloud forensic analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
312017
A logic-based network forensic model for evidence analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015
302015
Mapping evidence graphs to attack graphs
C Liu, A Singhal, D Wijesekera
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
252012
Creating integrated evidence graphs for network forensics
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013
182013
A probabilistic network forensic model for evidence analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XII: 12th IFIP WG 11.9 International …, 2016
112016
A Model Towards Using Evidence from Security Events for Network Attack Analysis.
C Liu, A Singhal, D Wijesekera
WOSIS, 83-95, 2014
112014
Relating admissibility standards for digital evidence to attack scenario reconstruction
C Liu, A Singhal, D Wijesekera
Journal of Digital Forensics, Security and Law 9 (2), 15, 2014
102014
Forensic analysis of advanced persistent threat attacks in cloud environments
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International …, 2020
82020
A layered graphical model for mission attack impact analysis
C Liu, A Singhal, D Wijesekera
2017 IEEE Conference on Communications and Network Security (CNS), 602-609, 2017
72017
Methodology for enabling forensic analysis using hypervisor vulnerabilities data
R Chandramouli, R Chandramouli, A Singhal, D Wijesekera, C Liu
US Department of Commerce, National Institute of Standards and Technology, 2019
62019
A layered graphical model for cloud forensic mission attack impact analysis
C Liu, A Singhal, D Wijesekera
Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International …, 2018
62018
Poster: A Logic Based Network Forensics Model for Evidence Analysis
A Singhal, C Liu, D Wijesekara
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
42015
IDENTIFYING AND CORRECTING VULNERABILITIES IN MACHINE LEARNING MODELS
C Liu, L DiValentine, N Liberman, A Hass, B McCarty
22022
A probabilistic logic programming based model for network forensics
C Liu
George Mason University, 2015
22015
Determining the Forensic Data Requirements for Investigating Hypervisor Attacks
C Liu, A Singhal, R Chandramouli, D Wijesekera
Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019
12019
A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks
R Chandramouli, A Singhal, D Wijesekera, C Liu
National Institute of Standards and Technology, 2018
12018
Build a Computationally Efficient Strong Defense against Adversarial Example Attacks
MBS Changwei Liu, Louis DiValentin, Aolin Ding
ICISSP, 2024
2024
DATA AUTHENTICATION AND VALIDATION ACROSS MULTIPLE SOURCES, INTERFACES, AND NETWORKS
CL Ben McCarty
US Patent 04658-PR-U S, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20