2008 |
13 | EE | Guofei Gu,
Alvaro A. Cárdenas,
Wenke Lee:
Principled reasoning and practical applications of alert fusion in intrusion detection systems.
ASIACCS 2008: 136-147 |
12 | EE | Guofei Gu,
Roberto Perdisci,
Junjie Zhang,
Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
USENIX Security Symposium 2008: 139-154 |
11 | EE | David Dagon,
Guofei Gu,
Christopher Lee:
A Taxonomy of Botnet Structures.
Botnet Detection 2008: 143-164 |
2007 |
10 | EE | David Dagon,
Guofei Gu,
Christopher P. Lee,
Wenke Lee:
A Taxonomy of Botnet Structures.
ACSAC 2007: 325-339 |
2006 |
9 | EE | Guofei Gu,
Prahlad Fogla,
Wenke Lee,
Douglas M. Blough:
DSO: Dependable Signing Overlay.
ACNS 2006: 33-49 |
8 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach.
ASIACCS 2006: 90-101 |
7 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
ESORICS 2006: 527-546 |
6 | EE | Weidong Shi,
Joshua B. Fryman,
Guofei Gu,
Hsien-Hsin S. Lee,
Youtao Zhang,
Jun Yang:
InfoShield: a security architecture for protecting information usage in memory.
HPCA 2006: 222-231 |
5 | EE | Roberto Perdisci,
Guofei Gu,
Wenke Lee:
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
ICDM 2006: 488-498 |
2005 |
4 | EE | Weidong Shi,
Hsien-Hsin S. Lee,
Guofei Gu,
Laura Falk,
Trevor N. Mudge,
Mrinmoy Ghosh:
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
ICAC 2005: 263-273 |
2004 |
3 | EE | Guofei Gu,
Monirul I. Sharif,
Xinzhou Qin,
David Dagon,
Wenke Lee,
George F. Riley:
Worm Detection, Early Warning and Response Based on Local Victim Information.
ACSAC 2004: 136-145 |
2 | EE | David Dagon,
Xinzhou Qin,
Guofei Gu,
Wenke Lee,
Julian B. Grizzard,
John G. Levine,
Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots.
RAID 2004: 39-58 |
2003 |
1 | EE | Guofei Gu,
Bin B. Zhu,
Shipeng Li,
Shiyong Zhang:
PLI: A New Framework to Protect Digital Content for P2P Networks.
ACNS 2003: 206-216 |