The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wenke Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    Mining Audit Data to Build Intrusion Detection Models. [Citation Graph (2, 0)][DBLP]
    KDD, 1998, pp:66-72 [Conf]
  2. Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan
    JAM: Java Agents for Meta-Learning over Distributed Databases. [Citation Graph (1, 0)][DBLP]
    KDD, 1997, pp:74-81 [Conf]
  3. Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough
    DSO: Dependable Signing Overlay. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:33-49 [Conf]
  4. Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley
    Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:136-145 [Conf]
  5. Xinzhou Qin, Wenke Lee
    Attack Plan Recognition and Prediction Using Causal Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:370-379 [Conf]
  6. Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee
    Anomalous path detection with hardware support. [Citation Graph (0, 0)][DBLP]
    CASES, 2005, pp:43-54 [Conf]
  7. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:90-101 [Conf]
  8. Prahlad Fogla, Wenke Lee
    Evading network anomaly detection systems: formal reasoning and practical techniques. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:59-68 [Conf]
  9. Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee
    Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:91-108 [Conf]
  10. Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller
    A Multiple Model Cost-Sensitive Approach for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ECML, 2000, pp:142-153 [Conf]
  11. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:527-546 [Conf]
  12. Xinzhou Qin, Wenke Lee
    Discovering Novel Attack Strategies from INFOSEC Alerts. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:439-456 [Conf]
  13. David Dagon, Wenke Lee, Richard J. Lipton
    Protecting Secret Data from Insider Attacks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:16-30 [Conf]
  14. Naser S. Barghouti, John Mocenigo, Wenke Lee
    Grappa: A GRAPh PAckage in Java. [Citation Graph (0, 0)][DBLP]
    Graph Drawing, 1997, pp:336-343 [Conf]
  15. Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
    Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:478-0 [Conf]
  16. Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan
    Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. [Citation Graph (0, 0)][DBLP]
    ICDM, 2001, pp:123-130 [Conf]
  17. Roberto Perdisci, Guofei Gu, Wenke Lee
    Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:488-498 [Conf]
  18. Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee
    Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2006, pp:613-620 [Conf]
  19. Wenke Lee, Christopher T. Park, Salvatore J. Stolfo
    Automated Intrusion Detection Using NFR: Methods and Experiences. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:63-72 [Conf]
  20. João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra
    Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:93-96 [Conf]
  21. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    KDD, 1999, pp:114-124 [Conf]
  22. George F. Riley, Monirul I. Sharif, Wenke Lee
    Simulating Internet Worms. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2004, pp:268-274 [Conf]
  23. Yongguang Zhang, Wenke Lee
    Intrusion detection in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2000, pp:275-283 [Conf]
  24. David Dagon, Cliff Zou, Wenke Lee
    Modeling Botnet Propagation Using Time Zones. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  25. Yongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao
    Heterogeneous networking: a new survivability paradigm. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:33-39 [Conf]
  26. Monirul I. Sharif, George F. Riley, Wenke Lee
    Comparative Study between Analytical Models and Packet-Level Worm Simulations. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:88-98 [Conf]
  27. Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang
    Performance Adaptation in Real-Time Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:252-273 [Conf]
  28. Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo
    A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:49-65 [Conf]
  29. Wenke Lee, Salvatore J. Stolfo
    Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  30. Xinzhou Qin, Wenke Lee
    Statistical Causality Analysis of INFOSEC Alert Data. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:73-93 [Conf]
  31. David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen
    HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:39-58 [Conf]
  32. Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
    Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:185-206 [Conf]
  33. Yi-an Huang, Wenke Lee
    Attack Analysis and Detection for Ad Hoc Routing Protocols. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:125-145 [Conf]
  34. Yi-an Huang, Wenke Lee
    A cooperative intrusion detection system for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:135-147 [Conf]
  35. Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller
    Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf]
  36. Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong
    Anomaly Detection Using Call Stack Information. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:62-0 [Conf]
  37. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    A Data Mining Framework for Building Intrusion Detection Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:120-132 [Conf]
  38. Wenke Lee, Dong Xiang
    Information-Theoretic Measures for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:130-143 [Conf]
  39. Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
    MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:17-31 [Conf]
  40. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish
    Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:479-498 [Conf]
  41. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    Adaptive Intrusion Detection: A Data Mining Approach. [Citation Graph (0, 0)][DBLP]
    Artif. Intell. Rev., 2000, v:14, n:6, pp:533-567 [Journal]
  42. Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok
    Toward Cost-Sensitive Modeling for Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:5-22 [Journal]
  43. João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra
    Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2002, v:10, n:2, pp:- [Journal]
  44. Wenke Lee, Gail E. Kaiser
    Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Integration, 1999, v:9, n:4, pp:329-358 [Journal]
  45. Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan
    Using artificial anomalies to detect unknown and known network intrusions. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2004, v:6, n:5, pp:507-527 [Journal]
  46. Wenke Lee
    Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:35-42 [Journal]
  47. Wenke Lee, Wei Fan
    Mining System Audit Data: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:4, pp:35-44 [Journal]
  48. Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin
    Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:4, pp:5-14 [Journal]
  49. Wenke Lee, Salvatore J. Stolfo
    A framework for constructing features and models for intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:227-261 [Journal]
  50. Prahlad Fogla, Wenke Lee
    q-Gram Matching Using Tree Models. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2006, v:18, n:4, pp:433-447 [Journal]
  51. Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee
    PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:289-300 [Conf]
  52. Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee
    Understanding Precision in Host Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:21-41 [Conf]

  53. Secure and Flexible Monitoring of Virtual Machines. [Citation Graph (, )][DBLP]


  54. A Taxonomy of Botnet Structures. [Citation Graph (, )][DBLP]


  55. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. [Citation Graph (, )][DBLP]


  56. Active Botnet Probing to Identify Obscure Command and Control Channels. [Citation Graph (, )][DBLP]


  57. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. [Citation Graph (, )][DBLP]


  58. Principled reasoning and practical applications of alert fusion in intrusion detection systems. [Citation Graph (, )][DBLP]


  59. Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. [Citation Graph (, )][DBLP]


  60. Ether: malware analysis via hardware virtualization extensions. [Citation Graph (, )][DBLP]


  61. Secure in-VM monitoring using hardware virtualization. [Citation Graph (, )][DBLP]


  62. Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP]


  63. Evaluating Bluetooth as a Medium for Botnet Command and Control. [Citation Graph (, )][DBLP]


  64. Evaluating email's feasibility for botnet command and control. [Citation Graph (, )][DBLP]


  65. WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. [Citation Graph (, )][DBLP]


  66. Eureka: A Framework for Enabling Static Malware Analysis. [Citation Graph (, )][DBLP]


  67. On the Secrecy of Spread-Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]


  68. Impeding Malware Analysis Using Conditional Code Obfuscation. [Citation Graph (, )][DBLP]


  69. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP]


  70. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. [Citation Graph (, )][DBLP]


  71. K-Tracer: A System for Extracting Kernel Malware Behavior. [Citation Graph (, )][DBLP]


  72. Recursive DNS Architectures and Vulnerability Implications. [Citation Graph (, )][DBLP]


  73. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. [Citation Graph (, )][DBLP]


  74. BLADE: Slashing the Invisible Channel of Drive-by Download Malware. [Citation Graph (, )][DBLP]


  75. A Centralized Monitoring Infrastructure for Improving DNS Security. [Citation Graph (, )][DBLP]


  76. On the Incoherencies in Web Browser Access Control Policies. [Citation Graph (, )][DBLP]


  77. Automatic Reverse Engineering of Malware Emulators. [Citation Graph (, )][DBLP]


  78. Lares: An Architecture for Secure Active Monitoring Using Virtualization. [Citation Graph (, )][DBLP]


  79. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. [Citation Graph (, )][DBLP]


  80. Hotspot-based traceback for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  81. Integrating intrusion detection and network management. [Citation Graph (, )][DBLP]


  82. McPAD: A multiple classifier system for accurate payload-based anomaly detection. [Citation Graph (, )][DBLP]


  83. Dynamic Trust Management. [Citation Graph (, )][DBLP]


Search in 0.009secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002