2008 |
16 | EE | Rui Wang,
XiaoFeng Wang,
Kehuan Zhang,
Zhuowei Li:
Towards automatic reverse engineering of software security configurations.
ACM Conference on Computer and Communications Security 2008: 245-256 |
15 | EE | Zhuowei Li,
XiaoFeng Wang,
Zhenkai Liang,
Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures.
DSN 2008: 237-246 |
14 | EE | Rui Wang,
XiaoFeng Wang,
Zhuowei Li:
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software .
USENIX Security Symposium 2008: 291-306 |
13 | EE | XiaoFeng Wang,
Zhuowei Li,
Jong Youl Choi,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
2007 |
12 | EE | Zhuowei Li,
XiaoFeng Wang,
Jong Youl Choi:
SpyShield: Preserving Privacy from Spy Add-Ons.
RAID 2007: 296-316 |
11 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
Evaluating the Effects of Model Generalization on Intrusion Detection Performance.
SEC 2007: 421-432 |
10 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.
TrustBus 2007: 54-64 |
2006 |
9 | EE | XiaoFeng Wang,
Zhuowei Li,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil,
Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation.
ACM Conference on Computer and Communications Security 2006: 37-46 |
8 | EE | Zhuowei Li,
Amitabha Das:
Analyzing and evaluating dynamics in stide performance for intrusion detection.
Knowl.-Based Syst. 19(7): 576-591 (2006) |
2005 |
7 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
Model Generalization and Its Implications on Intrusion Detection.
ACNS 2005: 222-237 |
6 | EE | Zhuowei Li,
Amitabha Das:
M of N Features vs. Intrusion Detection.
ICCSA (1) 2005: 994-1003 |
5 | EE | Zhuowei Li,
Amitabha Das,
Sabu Emmanuel:
Model Redundancy vs. Intrusion Detection.
ISPEC 2005: 217-229 |
4 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection.
PAKDD 2005: 702-712 |
2004 |
3 | EE | Zhuowei Li,
Amitabha Das:
Visualizing and Identifying Intrusion Context from System Calls Trace.
ACSAC 2004: 61-70 |
2 | EE | Zhuowei Li,
Amitabha Das:
Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors
CoRR cs.CR/0410068: (2004) |
2003 |
1 | EE | Zhuowei Li,
Amitabha Das,
Sukumar Nandi:
Utilizing Statistical Characteristics of N-grams for Intrusion Detection.
CW 2003: 486-493 |