default search action
Lorie M. Liebrock
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i7]Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Multi-Language to English Machine Translation Using Generative Pre-Trained Transformers. CoRR abs/2404.14680 (2024) - [i6]Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models. CoRR abs/2404.15681 (2024) - [i5]Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models. CoRR abs/2408.00197 (2024) - [i4]Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models. IACR Cryptol. ePrint Arch. 2024: 689 (2024) - [i3]Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models. IACR Cryptol. ePrint Arch. 2024: 1228 (2024) - 2023
- [j19]Nathan Fisk, Nicholas M. Kelly, Lorie M. Liebrock:
Cybersecurity communities of practice: Strategies for creating gateways to participation. Comput. Secur. 132: 103188 (2023) - [i2]Elijah Pelofske, Lorie M. Liebrock, Vincent Urias:
Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence. CoRR abs/2301.12013 (2023) - 2021
- [c22]Donovan Jenkins, Lorie M. Liebrock, Vince Urias:
Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence. ICCST 2021: 1-6 - [i1]Elijah Pelofske, Lorie M. Liebrock, Vincent Urias:
An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity. CoRR abs/2109.02473 (2021)
2010 – 2019
- 2017
- [c21]Vincent E. Urias, William M. S. Stout, Jean-Luc Watson, Cole Grim, Lorie M. Liebrock, Monzy Merza:
Technologies to enable cyber deception. ICCST 2017: 1-6 - 2016
- [j18]E. Earl Eiland, Lorie M. Liebrock:
Efficacious Discriminant Analysis (Classifier) Measures for End Users. Adv. Artif. Intell. 2016: 8173625:1-8173625:17 (2016) - 2015
- [j17]Alexander D. Kent, Lorie M. Liebrock, Joshua C. Neil:
Authentication graphs: Analyzing user behavior within an enterprise network. Comput. Secur. 48: 150-166 (2015) - 2014
- [j16]Alexander D. Kent, Lorie M. Liebrock, James Wernicke:
Differentiating User Authentication Graphs. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2): 24-38 (2014) - 2013
- [j15]E. Earl Eiland, Lorie M. Liebrock:
Efficacious End User Measures - Part 1: Relative Class Size and End User Problem Domains. Adv. Artif. Intell. 2013: 427958:1-427958:22 (2013) - [j14]Hakan Akkan, Michael Lang, Lorie M. Liebrock:
Understanding and isolating the noise in the Linux kernel. Int. J. High Perform. Comput. Appl. 27(2): 136-146 (2013) - [c20]Alexander D. Kent, Lorie M. Liebrock, Joshua Neil:
Web Adoption: An Attempt Toward Classifying Risky Internet Web Browsing Behavior. LASER 2013: 25-36 - [c19]Alexander D. Kent, Lorie M. Liebrock:
Differentiating User Authentication Graphs. IEEE Symposium on Security and Privacy Workshops 2013: 72-75 - 2012
- [c18]Hakan Akkan, Michael Lang, Lorie M. Liebrock:
Stepping towards noiseless Linux environment. ROSS@ICS 2012: 7:1-7:7 - 2011
- [j13]Daniel Quist, Lorie M. Liebrock:
Reversing Compiled Executables for Malware Analysis via Visualization. Inf. Vis. 10(2): 117-126 (2011) - [j12]Daniel Quist, Lorie M. Liebrock, Joshua Neil:
Improving antivirus accuracy with hypervisor assisted analysis. J. Comput. Virol. 7(2): 121-131 (2011) - [c17]Alexander D. Kent, Lorie M. Liebrock:
Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc Environments. COMPSAC Workshops 2011: 122-127 - [c16]Hugh Wimberly, Lorie M. Liebrock:
Using Fingerprint Authentication to Reduce System Security: An Empirical Study. IEEE Symposium on Security and Privacy 2011: 32-46 - 2010
- [j11]Lorie M. Liebrock, Brajendra Panda, Robert L. Hutchinson:
Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing. J. Digit. Forensic Pract. 3(1): 4 (2010) - [j10]Moses Schwartz, Curtis Hash, Lorie M. Liebrock:
Term distribution visualizations with Focus+Context - Overview and usability evaluation. Multim. Tools Appl. 50(3): 509-532 (2010) - [c15]Victor Echeverría, Lorie M. Liebrock, Dongwan Shin:
Permission Management System: Permission as a Service in Cloud Computing. COMPSAC Workshops 2010: 371-375
2000 – 2009
- 2009
- [c14]Moses Schwartz, Curtis Hash, Lorie M. Liebrock:
Term distribution visualizations with Focus+Context. SAC 2009: 1792-1799 - [c13]Daniel Quist, Lorie M. Liebrock:
Visualizing compiled executables for malware analysis. VizSEC 2009: 27-32 - 2008
- [j9]Lorie M. Liebrock, S. P. Goudy:
Methodology for modelling SPMD hybrid parallel computation. Concurr. Comput. Pract. Exp. 20(8): 903-940 (2008) - [j8]Vincent Urias, Curtis Hash, Lorie M. Liebrock:
Consideration of Issues for Parallel Digital Forensics of RAID Systems. J. Digit. Forensic Pract. 2(4): 196-208 (2008) - [c12]Moses Schwartz, Lorie M. Liebrock:
A Term Distribution Visualization Approach to Digital Forensic String Search. VizSEC 2008: 36-43 - 2007
- [j7]Lorie M. Liebrock:
Scholarship for Service: New Mexico Tech's Undergraduate Program. IEEE Distributed Syst. Online 8(3) (2007) - [c11]Unnati Thakore, Lorie M. Liebrock:
File and Memory Security Analysis for Grid Systems. HPCC 2007: 273-284 - [c10]Lorie M. Liebrock, Nico Marrero, David P. Burton, Ron Prine, E. Cornelius, M. Shakamuri, Vincent Urias:
A preliminary design for digital forensics analysis of terabyte size data sets. SAC 2007: 190-191 - [c9]Lorie M. Liebrock:
Integration of well posedness analysis in software engineering. SAC 2007: 1479-1483 - 2006
- [j6]Lorie M. Liebrock:
Problem solving with well posedness analysis: Part 1. Appl. Math. Comput. 181(2): 1671-1682 (2006) - [j5]Lorie M. Liebrock:
Education: Scholarship for Service. IEEE Distributed Syst. Online 7(9) (2006) - [c8]E. Earl Eiland, Lorie M. Liebrock:
Optimizing Network Data Transmission. ITNG 2006: 735-741 - [c7]E. Earl Eiland, Lorie M. Liebrock:
An Application of Information Theory to Intrusion Detection. IWIA 2006: 119-134 - 2005
- [c6]Lorie M. Liebrock:
Empirical sensitivity analysis for computational procedures. Richard Tapia Celebration of Diversity in Computing Conference 2005: 32-35 - [e2]Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, Roger L. Wainwright:
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005. ACM 2005, ISBN 1-58113-964-0 [contents] - 2004
- [j4]D. L. Hicks, Lorie M. Liebrock:
Conservative smoothing with B-splines stabilizes SPH material dynamics in both tension and compression. Appl. Math. Comput. 150(1): 213-234 (2004) - [c5]Lorie M. Liebrock, Yuan Ye, Ramesh Naidu Ande, Paul Richard Chen Ming:
Distributing Data in Composite Grid Applications for Grid Computing. IPDPS 2004 - [c4]Aishwarya Iyer, Lorie M. Liebrock:
Vulnerability Scanning for Buffer Overflow. ITCC (2) 2004: 116-117 - [e1]Hisham Haddad, Andrea Omicini, Roger L. Wainwright, Lorie M. Liebrock:
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004. ACM 2004, ISBN 1-58113-812-1 [contents] - 2000
- [j3]D. L. Hicks, Lorie M. Liebrock:
Lanczos' generalized derivative: Insights and Applications. Appl. Math. Comput. 112(1): 63-73 (2000)
1990 – 1999
- 1997
- [j2]Lorie M. Liebrock, Ken Kennedy:
Automatic Data Distribution for Composite Grid Applications. Sci. Program. 6(1): 95-113 (1997) - [c3]Lorie M. Liebrock:
Parallelization and Automatic Data Distribution for Nuclear Reactor Simulations. PP 1997 - 1996
- [j1]Lorie M. Liebrock, Ken Kennedy:
Parallelization support for coupled grid applications with small meshes. Concurr. Pract. Exp. 8(8): 581-615 (1996) - 1994
- [c2]Lorie M. Liebrock, Ken Kennedy:
Parallelization of Linearized Applications in Fortran D. IPPS 1994: 51-60
1980 – 1989
- 1988
- [c1]J. A. Jackson, Lorie M. Liebrock, Lynn R. Ziegler:
A hybrid hypercube algorithm for the symmetric tridiagonal eigenvalue problem. C³P 1988: 1546-1547
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 01:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint