2009 | ||
---|---|---|
69 | David A. Basin, Srdjan Capkun, Wenke Lee: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 ACM 2009 | |
68 | EE | Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee: McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53(6): 864-881 (2009) |
2008 | ||
67 | Wenke Lee, Cliff Wang, David Dagon: Botnet Detection: Countering the Largest Security Threat Springer 2008 | |
66 | EE | David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ACM Conference on Computer and Communications Security 2008: 211-222 |
65 | EE | Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee: Ether: malware analysis via hardware virtualization extensions. ACM Conference on Computer and Communications Security 2008: 51-62 |
64 | EE | Guofei Gu, Alvaro A. Cárdenas, Wenke Lee: Principled reasoning and practical applications of alert fusion in intrusion detection systems. ASIACCS 2008: 136-147 |
63 | EE | Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee: Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385 |
62 | EE | Monirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee: Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500 |
61 | EE | Bryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee: Lares: An Architecture for Secure Active Monitoring Using Virtualization. IEEE Symposium on Security and Privacy 2008: 233-247 |
60 | EE | Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154 |
59 | EE | Roberto Perdisci, Andrea Lanzi, Wenke Lee: Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters 29(14): 1941-1946 (2008) |
2007 | ||
58 | EE | David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339 |
57 | EE | Bryan D. Payne, Wenke Lee: Secure and Flexible Monitoring of Virtual Machines. ACSAC 2007: 385-397 |
56 | EE | Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee: Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41 |
55 | EE | David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498 |
54 | EE | Bryan D. Payne, Reiner Sailer, Ramón Cáceres, Ronald Perez, Wenke Lee: A layered approach to simplified access control in virtualized systems. Operating Systems Review 41(4): 12-19 (2007) |
2006 | ||
53 | EE | Prahlad Fogla, Wenke Lee: Evading network anomaly detection systems: formal reasoning and practical techniques. ACM Conference on Computer and Communications Security 2006: 59-68 |
52 | EE | Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough: DSO: Dependable Signing Overlay. ACNS 2006: 33-49 |
51 | EE | Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee: PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300 |
50 | EE | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101 |
49 | EE | Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108 |
48 | EE | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546 |
47 | EE | Roberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498 |
46 | EE | Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee: Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620 |
45 | EE | Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31 |
44 | EE | David Dagon, Cliff Changchun Zou, Wenke Lee: Modeling Botnet Propagation Using Time Zones. NDSS 2006 |
43 | EE | Prahlad Fogla, Wenke Lee: q-Gram Matching Using Tree Models. IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006) |
2005 | ||
42 | EE | Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee: Anomalous path detection with hardware support. CASES 2005: 43-54 |
41 | EE | David Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30 |
40 | EE | Monirul I. Sharif, George F. Riley, Wenke Lee: Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98 |
39 | EE | Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206 |
38 | EE | Yi-an Huang, Wenke Lee: Hotspot-based traceback for mobile ad hoc networks. Workshop on Wireless Security 2005: 43-54 |
2004 | ||
37 | EE | Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145 |
36 | EE | Xinzhou Qin, Wenke Lee: Attack Plan Recognition and Prediction Using Causal Networks. ACSAC 2004: 370-379 |
35 | EE | Xinzhou Qin, Wenke Lee: Discovering Novel Attack Strategies from INFOSEC Alerts. ESORICS 2004: 439-456 |
34 | EE | Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194- |
33 | EE | George F. Riley, Monirul I. Sharif, Wenke Lee: Simulating Internet Worms. MASCOTS 2004: 268-274 |
32 | EE | Yi-an Huang, Wenke Lee: Attack Analysis and Detection for Ad Hoc Routing Protocols. RAID 2004: 125-145 |
31 | EE | David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58 |
30 | EE | Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004) |
2003 | ||
29 | EE | Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ICDCS 2003: 478- |
28 | EE | Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong: Anomaly Detection Using Call Stack Information. IEEE Symposium on Security and Privacy 2003: 62- |
27 | João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96 | |
26 | EE | Xinzhou Qin, Wenke Lee: Statistical Causality Analysis of INFOSEC Alert Data. RAID 2003: 73-93 |
25 | EE | Yi-an Huang, Wenke Lee: A cooperative intrusion detection system for ad hoc networks. SASN 2003: 135-147 |
2002 | ||
24 | EE | Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera: Integrating intrusion detection and network management. NOMS 2002: 329-344 |
23 | EE | Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang: Performance Adaptation in Real-Time Intrusion Detection Systems. RAID 2002: 252-273 |
22 | João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. J. Network Syst. Manage. 10(2): (2002) | |
21 | Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002) | |
20 | EE | Wenke Lee: Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. SIGKDD Explorations 4(2): 35-42 (2002) |
2001 | ||
19 | Wenke Lee, Ludovic Mé, Andreas Wespi: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings Springer 2001 | |
18 | EE | Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130 |
17 | EE | Wenke Lee, Dong Xiang: Information-Theoretic Measures for Anomaly Detection. IEEE Symposium on Security and Privacy 2001: 130-143 |
16 | EE | Yongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao: Heterogeneous networking: a new survivability paradigm. NSPW 2001: 33-39 |
15 | EE | Wenke Lee, Wei Fan: Mining System Audit Data: Opportunities and Challenges. SIGMOD Record 30(4): 35-44 (2001) |
14 | EE | Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001) |
2000 | ||
13 | EE | Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153 |
12 | EE | Yongguang Zhang, Wenke Lee: Intrusion detection in wireless ad-hoc networks. MOBICOM 2000: 275-283 |
11 | EE | Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65 |
10 | EE | Wenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000) |
9 | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000) | |
1999 | ||
8 | EE | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132 |
7 | EE | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124 |
6 | EE | Wenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999 |
5 | EE | Wenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72 |
4 | Wenke Lee, Gail E. Kaiser: Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. Journal of Systems Integration 9(4): 329-358 (1999) | |
1998 | ||
3 | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72 | |
1997 | ||
2 | Naser S. Barghouti, John M. Mocenigo, Wenke Lee: Grappa: A GRAPh PAckage in Java. Graph Drawing 1997: 336-343 | |
1 | Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan: JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81 |