dblp.uni-trier.dewww.uni-trier.de

Zhuowei Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
16EERui Wang, XiaoFeng Wang, Kehuan Zhang, Zhuowei Li: Towards automatic reverse engineering of software security configurations. ACM Conference on Computer and Communications Security 2008: 245-256
15EEZhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter: AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246
14EERui Wang, XiaoFeng Wang, Zhuowei Li: Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . USENIX Security Symposium 2008: 291-306
13EEXiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil: Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
2007
12EEZhuowei Li, XiaoFeng Wang, Jong Youl Choi: SpyShield: Preserving Privacy from Spy Add-Ons. RAID 2007: 296-316
11EEZhuowei Li, Amitabha Das, Jianying Zhou: Evaluating the Effects of Model Generalization on Intrusion Detection Performance. SEC 2007: 421-432
10EEZhuowei Li, Amitabha Das, Jianying Zhou: Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. TrustBus 2007: 54-64
2006
9EEXiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi: Packet vaccine: black-box exploit detection and signature generation. ACM Conference on Computer and Communications Security 2006: 37-46
8EEZhuowei Li, Amitabha Das: Analyzing and evaluating dynamics in stide performance for intrusion detection. Knowl.-Based Syst. 19(7): 576-591 (2006)
2005
7EEZhuowei Li, Amitabha Das, Jianying Zhou: Model Generalization and Its Implications on Intrusion Detection. ACNS 2005: 222-237
6EEZhuowei Li, Amitabha Das: M of N Features vs. Intrusion Detection. ICCSA (1) 2005: 994-1003
5EEZhuowei Li, Amitabha Das, Sabu Emmanuel: Model Redundancy vs. Intrusion Detection. ISPEC 2005: 217-229
4EEZhuowei Li, Amitabha Das, Jianying Zhou: USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. PAKDD 2005: 702-712
2004
3EEZhuowei Li, Amitabha Das: Visualizing and Identifying Intrusion Context from System Calls Trace. ACSAC 2004: 61-70
2EEZhuowei Li, Amitabha Das: Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors CoRR cs.CR/0410068: (2004)
2003
1EEZhuowei Li, Amitabha Das, Sukumar Nandi: Utilizing Statistical Characteristics of N-grams for Intrusion Detection. CW 2003: 486-493

Coauthor Index

1Jong Youl Choi [9] [12] [13]
2Amitabha Das [1] [2] [3] [4] [5] [6] [7] [8] [10] [11]
3Sabu Emmanuel [5]
4Chongkyung Kil [9] [13]
5Zhenkai Liang [15]
6Sukumar Nandi [1]
7Michael K. Reiter [9] [13] [15]
8Rui Wang [14] [16]
9XiaoFeng Wang [9] [12] [13] [14] [15] [16]
10Jun Xu [9] [13]
11Kehuan Zhang [16]
12Jianying Zhou [4] [7] [10] [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)