| 2009 |
| 9 | EE | Roberto Perdisci,
Davide Ariu,
Prahlad Fogla,
Giorgio Giacinto,
Wenke Lee:
McPAD: A multiple classifier system for accurate payload-based anomaly detection.
Computer Networks 53(6): 864-881 (2009) |
| 2006 |
| 8 | EE | Prahlad Fogla,
Wenke Lee:
Evading network anomaly detection systems: formal reasoning and practical techniques.
ACM Conference on Computer and Communications Security 2006: 59-68 |
| 7 | EE | Guofei Gu,
Prahlad Fogla,
Wenke Lee,
Douglas M. Blough:
DSO: Dependable Signing Overlay.
ACNS 2006: 33-49 |
| 6 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach.
ASIACCS 2006: 90-101 |
| 5 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
ESORICS 2006: 527-546 |
| 4 | EE | Roberto Perdisci,
David Dagon,
Wenke Lee,
Prahlad Fogla,
Monirul I. Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection.
IEEE Symposium on Security and Privacy 2006: 17-31 |
| 3 | EE | Prahlad Fogla,
Wenke Lee:
q-Gram Matching Using Tree Models.
IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006) |
| 2003 |
| 2 | EE | Henry Hanping Feng,
Oleg M. Kolesnikov,
Prahlad Fogla,
Wenke Lee,
Weibo Gong:
Anomaly Detection Using Call Stack Information.
IEEE Symposium on Security and Privacy 2003: 62- |
| 2002 |
| 1 | EE | Michael J. Covington,
Prahlad Fogla,
Zhiyuan Zhan,
Mustaque Ahamad:
A Context-Aware Security Architecture for Emerging Applications.
ACSAC 2002: 249-260 |