Guofei Gu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

13EEGuofei Gu, Alvaro A. Cárdenas, Wenke Lee: Principled reasoning and practical applications of alert fusion in intrusion detection systems. ASIACCS 2008: 136-147
12EEGuofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154
11EEDavid Dagon, Guofei Gu, Christopher Lee: A Taxonomy of Botnet Structures. Botnet Detection 2008: 143-164
10EEDavid Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339
9EEGuofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough: DSO: Dependable Signing Overlay. ACNS 2006: 33-49
8EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101
7EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546
6EEWeidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang: InfoShield: a security architecture for protecting information usage in memory. HPCA 2006: 222-231
5EERoberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498
4EEWeidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh: An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. ICAC 2005: 263-273
3EEGuofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145
2EEDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
1EEGuofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang: PLI: A New Framework to Protect Digital Content for P2P Networks. ACNS 2003: 206-216

Coauthor Index

1Douglas M. Blough [9]
2Alvaro A. Cárdenas [13]
3David Dagon [2] [3] [7] [8] [10] [11]
4Laura Falk [4]
5Prahlad Fogla [7] [8] [9]
6Joshua B. Fryman [6]
7Mrinmoy Ghosh [4]
8Julian B. Grizzard [2]
9Christopher Lee [11]
10Christopher P. Lee [10]
11Hsien-Hsin S. Lee [4] [6]
12Wenke Lee [2] [3] [5] [7] [8] [9] [10] [12] [13]
13John G. Levine [2]
14Shipeng Li [1]
15Trevor N. Mudge [4]
16Henry L. Owen [2]
17Roberto Perdisci [5] [12]
18Xinzhou Qin [2] [3]
19George F. Riley [3]
20Monirul I. Sharif [3]
21Weidong Shi [4] [6]
22Boris Skoric [7] [8]
23Jun Yang [6]
24Junjie Zhang [12]
25Shiyong Zhang [1]
26Youtao Zhang [6]
27Bin B. Zhu [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)