2009 |
9 | EE | Roberto Perdisci,
Davide Ariu,
Prahlad Fogla,
Giorgio Giacinto,
Wenke Lee:
McPAD: A multiple classifier system for accurate payload-based anomaly detection.
Computer Networks 53(6): 864-881 (2009) |
2006 |
8 | EE | Prahlad Fogla,
Wenke Lee:
Evading network anomaly detection systems: formal reasoning and practical techniques.
ACM Conference on Computer and Communications Security 2006: 59-68 |
7 | EE | Guofei Gu,
Prahlad Fogla,
Wenke Lee,
Douglas M. Blough:
DSO: Dependable Signing Overlay.
ACNS 2006: 33-49 |
6 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach.
ASIACCS 2006: 90-101 |
5 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
ESORICS 2006: 527-546 |
4 | EE | Roberto Perdisci,
David Dagon,
Wenke Lee,
Prahlad Fogla,
Monirul I. Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection.
IEEE Symposium on Security and Privacy 2006: 17-31 |
3 | EE | Prahlad Fogla,
Wenke Lee:
q-Gram Matching Using Tree Models.
IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006) |
2003 |
2 | EE | Henry Hanping Feng,
Oleg M. Kolesnikov,
Prahlad Fogla,
Wenke Lee,
Weibo Gong:
Anomaly Detection Using Call Stack Information.
IEEE Symposium on Security and Privacy 2003: 62- |
2002 |
1 | EE | Michael J. Covington,
Prahlad Fogla,
Zhiyuan Zhan,
Mustaque Ahamad:
A Context-Aware Security Architecture for Emerging Applications.
ACSAC 2002: 249-260 |