Wenke Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

69 David A. Basin, Srdjan Capkun, Wenke Lee: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 ACM 2009
68EERoberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee: McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53(6): 864-881 (2009)
67 Wenke Lee, Cliff Wang, David Dagon: Botnet Detection: Countering the Largest Security Threat Springer 2008
66EEDavid Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ACM Conference on Computer and Communications Security 2008: 211-222
65EEArtem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee: Ether: malware analysis via hardware virtualization extensions. ACM Conference on Computer and Communications Security 2008: 51-62
64EEGuofei Gu, Alvaro A. Cárdenas, Wenke Lee: Principled reasoning and practical applications of alert fusion in intrusion detection systems. ASIACCS 2008: 136-147
63EEKapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee: Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385
62EEMonirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee: Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500
61EEBryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee: Lares: An Architecture for Secure Active Monitoring Using Virtualization. IEEE Symposium on Security and Privacy 2008: 233-247
60EEGuofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154
59EERoberto Perdisci, Andrea Lanzi, Wenke Lee: Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters 29(14): 1941-1946 (2008)
58EEDavid Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339
57EEBryan D. Payne, Wenke Lee: Secure and Flexible Monitoring of Virtual Machines. ACSAC 2007: 385-397
56EEMonirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee: Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41
55EEDavid Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498
54EEBryan D. Payne, Reiner Sailer, Ramón Cáceres, Ronald Perez, Wenke Lee: A layered approach to simplified access control in virtualized systems. Operating Systems Review 41(4): 12-19 (2007)
53EEPrahlad Fogla, Wenke Lee: Evading network anomaly detection systems: formal reasoning and practical techniques. ACM Conference on Computer and Communications Security 2006: 59-68
52EEGuofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough: DSO: Dependable Signing Overlay. ACNS 2006: 33-49
51EEPaul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee: PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300
50EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101
49EECollin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
48EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546
47EERoberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498
46EEHongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee: Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620
45EERoberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31
44EEDavid Dagon, Cliff Changchun Zou, Wenke Lee: Modeling Botnet Propagation Using Time Zones. NDSS 2006
43EEPrahlad Fogla, Wenke Lee: q-Gram Matching Using Tree Models. IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006)
42EETao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee: Anomalous path detection with hardware support. CASES 2005: 43-54
41EEDavid Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30
40EEMonirul I. Sharif, George F. Riley, Wenke Lee: Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98
39EEJonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206
38EEYi-an Huang, Wenke Lee: Hotspot-based traceback for mobile ad hoc networks. Workshop on Wireless Security 2005: 43-54
37EEGuofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145
36EEXinzhou Qin, Wenke Lee: Attack Plan Recognition and Prediction Using Causal Networks. ACSAC 2004: 370-379
35EEXinzhou Qin, Wenke Lee: Discovering Novel Attack Strategies from INFOSEC Alerts. ESORICS 2004: 439-456
34EEHenry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194-
33EEGeorge F. Riley, Monirul I. Sharif, Wenke Lee: Simulating Internet Worms. MASCOTS 2004: 268-274
32EEYi-an Huang, Wenke Lee: Attack Analysis and Detection for Ad Hoc Routing Protocols. RAID 2004: 125-145
31EEDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
30EEWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004)
29EEYi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ICDCS 2003: 478-
28EEHenry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong: Anomaly Detection Using Call Stack Information. IEEE Symposium on Security and Privacy 2003: 62-
27 João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96
26EEXinzhou Qin, Wenke Lee: Statistical Causality Analysis of INFOSEC Alert Data. RAID 2003: 73-93
25EEYi-an Huang, Wenke Lee: A cooperative intrusion detection system for ad hoc networks. SASN 2003: 135-147
24EEXinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera: Integrating intrusion detection and network management. NOMS 2002: 329-344
23EEWenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang: Performance Adaptation in Real-Time Intrusion Detection Systems. RAID 2002: 252-273
22 João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. J. Network Syst. Manage. 10(2): (2002)
21 Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002)
20EEWenke Lee: Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. SIGKDD Explorations 4(2): 35-42 (2002)
19 Wenke Lee, Ludovic Mé, Andreas Wespi: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings Springer 2001
18EEWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130
17EEWenke Lee, Dong Xiang: Information-Theoretic Measures for Anomaly Detection. IEEE Symposium on Security and Privacy 2001: 130-143
16EEYongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao: Heterogeneous networking: a new survivability paradigm. NSPW 2001: 33-39
15EEWenke Lee, Wei Fan: Mining System Audit Data: Opportunities and Challenges. SIGMOD Record 30(4): 35-44 (2001)
14EESalvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001)
13EEWei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153
12EEYongguang Zhang, Wenke Lee: Intrusion detection in wireless ad-hoc networks. MOBICOM 2000: 275-283
11EEWenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65
10EEWenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000)
9 Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000)
8EEWenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132
7EEWenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124
6EEWenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999
5EEWenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72
4 Wenke Lee, Gail E. Kaiser: Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. Journal of Systems Integration 9(4): 329-358 (1999)
3 Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72
2 Naser S. Barghouti, John M. Mocenigo, Wenke Lee: Grappa: A GRAPh PAckage in Java. Graph Drawing 1997: 336-343
1 Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan: JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81

Coauthor Index

1Lorenzo Alvisi [16]
2Manos Antonakakis [66]
3Davide Ariu [68]
4Niranjan Balwalli [23]
5Naser S. Barghouti [2]
6David A. Basin [69]
7Douglas M. Blough [52]
8João B. D. Cabrera [22] [23] [24] [27]
9Ramón Cáceres [54]
10Srdjan Capkun [69]
11Martim Carbone [61]
12Alvaro A. Cárdenas [64]
13David Cash [55]
14Philip K. Chan [1] [14] [18] [30]
15David Dagon [31] [37] [39] [41] [44] [45] [48] [49] [50] [51] [58] [66] [67]
16Son K. Dao [16]
17Hongmei Deng [46]
18Pragneshkumar H. Desai [11]
19Artem Dinaburg [65]
20Yan Zong Ding [55]
21Yevgeniy Dodis [55]
22Robert Edmonds [51]
23Eleazar Eskin [14]
24Dave W. Fan [1]
25Wei Fan [13] [14] [15] [18] [21] [29] [30]
26Henry Hanping Feng [28] [34]
27Prahlad Fogla [28] [43] [45] [48] [50] [52] [53] [68]
28Giorgio Giacinto [68]
29Jonathon T. Giffin [34] [39] [56] [63]
30Weibo Gong [28]
31Julian B. Grizzard [31]
32Guofei Gu [31] [37] [47] [48] [50] [52] [58] [60] [64]
33Carlos Gutiérrez [27]
34Mitch Halpin [51]
35Yi-an Huang [25] [29] [32] [38]
36Yong Huang [34]
37Somesh Jha [34] [39]
38Tatuya Jinmei [66]
39Gail E. Kaiser [4]
40Oleg M. Kolesnikov [28]
41Andrea Lanzi [59]
42Christopher P. Lee [58]
43John G. Levine [31]
44Renato Levy [46]
45Lundy M. Lewis [22] [24] [27]
46Jason H. Li [46]
47Richard J. Lipton [41] [55]
48Ludovic Mé [19]
49Raman K. Mehra [22] [27]
50Barton P. Miller [34] [39]
51Matthew Miller [13] [18] [21] [30]
52John M. Mocenigo [2]
53Kui W. Mok [3] [7] [8] [9]
54Collin Mulliner [49]
55Rahul A. Nimbalkar [11]
56Henry L. Owen [31]
57Santosh Pande [42]
58Christopher T. Park [5]
59Sunil B. Patil [11]
60Bryan D. Payne [54] [57] [61]
61Roberto Perdisci [45] [47] [59] [60] [68]
62Ronald Perez [54]
63Phillip A. Porras [62]
64Andreas L. Prodromidis [1]
65Xinzhou Qin [22] [24] [26] [27] [31] [35] [36] [37]
66George F. Riley [33] [37] [40]
67Paul Royal [51] [65]
68Hassen Saïdi [62]
69Reiner Sailer [54]
70Sunmeet Saluja [23]
71Monirul I. Sharif [33] [37] [40] [45] [56] [61] [62] [65]
72Kapil Singh [56] [63]
73Boris Skoric [48] [50]
74Abhinav Srivastava [63]
75Salvatore J. Stolfo [1] [3] [5] [6] [7] [8] [9] [10] [11] [13] [14] [18] [21] [30]
76Ashley Thomas [23]
77Thuan T. Tran [11]
78Shelley Tselepis [1]
79Giovanni Vigna [49]
80Harrick M. Vin [16]
81Paul Vixie [66]
82Shabsi Walfish [55]
83Cliff Wang [67]
84Andreas Wespi [19]
85Dong Xiang [17]
86Roger Xu [46]
87Kam K. Yee [11]
88Vinod Yegneswaran [62]
89Philip S. Yu [29]
90Erez Zadok [21]
91Frank Zhang [46]
92Junjie Zhang [60]
93Tao Zhang [42]
94Yi Zhang [23]
95Yongguang Zhang [12] [16]
96Xiaotong Zhuang [42]
97Cliff Changchun Zou [44]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)