Lorie M. Liebrock

According to our database1, Lorie M. Liebrock authored at least 43 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cybersecurity communities of practice: Strategies for creating gateways to participation.
Comput. Secur., September, 2023

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence.
CoRR, 2023

2021
An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity.
CoRR, 2021

Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence.
Proceedings of the 2021 International Carnahan Conference on Security Technology, 2021

2017
Technologies to enable cyber deception.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
Efficacious Discriminant Analysis (Classifier) Measures for End Users.
Adv. Artif. Intell., 2016

2015
Authentication graphs: Analyzing user behavior within an enterprise network.
Comput. Secur., 2015

2014
Differentiating User Authentication Graphs.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

2013
Understanding and isolating the noise in the Linux kernel.
Int. J. High Perform. Comput. Appl., 2013

Efficacious End User Measures - Part 1: Relative Class Size and End User Problem Domains.
Adv. Artif. Intell., 2013

Differentiating User Authentication Graphs.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Web Adoption: An Attempt Toward Classifying Risky Internet Web Browsing Behavior.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

2012
Stepping towards noiseless Linux environment.
Proceedings of the 2nd International Workshop on Runtime and Operating Systems for Supercomputers, 2012

2011
Improving antivirus accuracy with hypervisor assisted analysis.
J. Comput. Virol., 2011

Reversing Compiled Executables for Malware Analysis via Visualization.
Inf. Vis., 2011

Using Fingerprint Authentication to Reduce System Security: An Empirical Study.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc Environments.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Term distribution visualizations with Focus+Context - Overview and usability evaluation.
Multim. Tools Appl., 2010

Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing.
J. Digit. Forensic Pract., 2010

Permission Management System: Permission as a Service in Cloud Computing.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Visualizing compiled executables for malware analysis.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

Term distribution visualizations with Focus+Context.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Consideration of Issues for Parallel Digital Forensics of RAID Systems.
J. Digit. Forensic Pract., 2008

Methodology for modelling SPMD hybrid parallel computation.
Concurr. Comput. Pract. Exp., 2008

A Term Distribution Visualization Approach to Digital Forensic String Search.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2007
Scholarship for Service: New Mexico Tech's Undergraduate Program.
IEEE Distributed Syst. Online, 2007

A preliminary design for digital forensics analysis of terabyte size data sets.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Integration of well posedness analysis in software engineering.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

File and Memory Security Analysis for Grid Systems.
Proceedings of the High Performance Computing and Communications, 2007

2006
Education: Scholarship for Service.
IEEE Distributed Syst. Online, 2006

Problem solving with well posedness analysis: Part 1.
Appl. Math. Comput., 2006

An Application of Information Theory to Intrusion Detection.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

Optimizing Network Data Transmission.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

2005
Empirical sensitivity analysis for computational procedures.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2005, 2005

2004
Conservative smoothing with B-splines stabilizes SPH material dynamics in both tension and compression.
Appl. Math. Comput., 2004

Vulnerability Scanning for Buffer Overflow.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Distributing Data in Composite Grid Applications for Grid Computing.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

2000
Lanczos' generalized derivative: Insights and Applications.
Appl. Math. Comput., 2000

1997
Automatic Data Distribution for Composite Grid Applications.
Sci. Program., 1997

Parallelization and Automatic Data Distribution for Nuclear Reactor Simulations.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997

1996
Parallelization support for coupled grid applications with small meshes.
Concurr. Pract. Exp., 1996

1994
Parallelization of Linearized Applications in Fortran D.
Proceedings of the 8th International Symposium on Parallel Processing, 1994

1988
A hybrid hypercube algorithm for the symmetric tridiagonal eigenvalue problem.
Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, 1988


  Loading...