Follow
Lorie Liebrock
Lorie Liebrock
Director of Cybersecurity Centers, Professor of Computer Science & Eng., New Mexico Tech
Verified email at nmt.edu
Title
Cited by
Cited by
Year
Visualizing compiled executables for malware analysis
DA Quist, LM Liebrock
2009 6th International Workshop on Visualization for Cyber Security, 27-32, 2009
1192009
Authentication graphs: Analyzing user behavior within an enterprise network
AD Kent, LM Liebrock, JC Neil
Computers & Security 48, 150-166, 2015
922015
Using fingerprint authentication to reduce system security: An empirical study
H Wimberly, LM Liebrock
2011 ieee symposium on security and privacy, 32-46, 2011
712011
An application of information theory to intrusion detection
EE Eiland, LM Liebrock
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 16 pp …, 2006
402006
Stepping towards noiseless linux environment
H Akkan, M Lang, LM Liebrock
Proceedings of the 2nd international workshop on runtime and operating …, 2012
322012
Detecting anomalous behavior via user authentication graphs
A Kent, J Neil, L Liebrock
US Patent 10,015,175, 2018
282018
Improving antivirus accuracy with hypervisor assisted analysis
D Quist, L Liebrock, J Neil
Journal in computer virology 7, 121-131, 2011
282011
Permission management system: Permission as a service in cloud computing
V Echeverria, LM Liebrock, D Shin
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
282010
Lanczos' generalized derivative: insights and applications
DL Hicks, LM Liebrock
Applied mathematics and computation 112 (1), 63-73, 2000
282000
SPH hydrocodes can be stabilized with shape-shifting
DL Hicks, LM Liebrock
Computers & Mathematics with Applications 38 (5-6), 1-16, 1999
271999
Methodology for modelling SPMD hybrid parallel computation.
LM Liebrock, SP Goudy
Concurrency & Computation: Practice & Experience 20 (8), 2008
222008
Multi-processor parallel computer architecture using a parallel machine with topology-based mappings of composite grid applications
LM Liebrock
US Patent 5,737,623, 1998
191998
Understanding and isolating the noise in the Linux kernel
H Akkan, M Lang, L Liebrock
The International journal of high performance computing applications 27 (2 …, 2013
182013
Differentiating user authentication graphs
AD Kent, LM Liebrock
2013 IEEE Security and Privacy Workshops, 72-75, 2013
172013
Conservative smoothing with B-splines stabilizes SPH material dynamics in both tension and compression
DL Hicks, LM Liebrock
Applied mathematics and computation 150 (1), 213-234, 2004
172004
Technologies to enable cyber deception
VE Urias, WMS Stout, J Luc-Watson, C Grim, L Liebrock, M Merza
2017 International Carnahan Conference on Security Technology (ICCST), 1-6, 2017
162017
Secure communication via shared knowledge and a salted hash in ad-hoc environments
AD Kent, LM Liebrock
2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011
152011
Term Distribution Visualizations with Focus+Context Overview and Usability Evaluation
M Schwartz, C Hash, LM Liebrock
Multimedia Tools and Applications, 2010
14*2010
A preliminary design for digital forensics analysis of terabyte size data sets
LM Liebrock, N Marrero, DP Burton, R Prine, E Cornelius, M Shakamuri, ...
Proceedings of the 2007 ACM symposium on applied computing, 190-191, 2007
142007
Parallelization of linearized applications in fortran d
LM Liebrock, K Kennedy
Proceedings of 8th International Parallel Processing Symposium, 51-60, 1994
141994
The system can't perform the operation now. Try again later.
Articles 1–20