2009 |
9 | EE | Brent ByungHoon Kang,
Eric Chan-Tin,
Christopher P. Lee,
James Tyra,
Hun Jeong Kang,
Chris Nunnery,
Zachariah Wadler,
Greg Sinclair,
Nicholas Hopper,
David Dagon,
Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet.
ASIACCS 2009: 23-34 |
2008 |
8 | EE | A. Selcuk Uluagac,
Christopher P. Lee,
Raheem A. Beyah,
John A. Copeland:
Designing Secure Protocols for Wireless Sensor Networks.
WASA 2008: 503-514 |
2007 |
7 | EE | David Dagon,
Guofei Gu,
Christopher P. Lee,
Wenke Lee:
A Taxonomy of Botnet Structures.
ACSAC 2007: 325-339 |
6 | EE | Yusun Chang,
Christopher P. Lee,
John A. Copeland:
Goodput optimization in CSMA/CA wireless networks.
BROADNETS 2007: 880-888 |
5 | | Yusun Chang,
Christopher P. Lee,
B. K. Kwon,
John A. Copeland:
Dynamic Optimal Fragmentation with Rate Adaptation for Goodput Enhancement in WLANs.
ICWN 2007: 12-17 |
2006 |
4 | EE | Christopher P. Lee,
John A. Copeland:
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers.
VizSEC 2006: 103-108 |
3 | EE | Gregory J. Conti,
Kulsoom Abdullah,
Julian B. Grizzard,
John T. Stasko,
John A. Copeland,
Mustaque Ahamad,
Henry L. Owen,
Christopher P. Lee:
Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications 26(2): 60-70 (2006) |
2005 |
2 | EE | Kulsoom Abdullah,
Christopher P. Lee,
Gregory J. Conti,
John A. Copeland,
John T. Stasko:
IDS RainStorm: Visualizing IDS Alarms.
VizSEC 2005: 1 |
1 | EE | Christopher P. Lee,
Jason Trost,
Nicholas Gibbs,
Raheem A. Beyah,
John A. Copeland:
Visual Firewall: Real-time Network Security Monito.
VizSEC 2005: 16 |