Search the dblp DataBase
Wenke Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Wenke Lee , Salvatore J. Stolfo , Kui W. Mok Mining Audit Data to Build Intrusion Detection Models. [Citation Graph (2, 0)][DBLP ] KDD, 1998, pp:66-72 [Conf ] Salvatore J. Stolfo , Andreas L. Prodromidis , Shelley Tselepis , Wenke Lee , Dave W. Fan , Philip K. Chan JAM: Java Agents for Meta-Learning over Distributed Databases. [Citation Graph (1, 0)][DBLP ] KDD, 1997, pp:74-81 [Conf ] Guofei Gu , Prahlad Fogla , Wenke Lee , Douglas M. Blough DSO: Dependable Signing Overlay. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:33-49 [Conf ] Guofei Gu , Monirul I. Sharif , Xinzhou Qin , David Dagon , Wenke Lee , George F. Riley Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:136-145 [Conf ] Xinzhou Qin , Wenke Lee Attack Plan Recognition and Prediction Using Causal Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:370-379 [Conf ] Tao Zhang , Xiaotong Zhuang , Santosh Pande , Wenke Lee Anomalous path detection with hardware support. [Citation Graph (0, 0)][DBLP ] CASES, 2005, pp:43-54 [Conf ] Guofei Gu , Prahlad Fogla , David Dagon , Wenke Lee , Boris Skoric Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:90-101 [Conf ] Prahlad Fogla , Wenke Lee Evading network anomaly detection systems: formal reasoning and practical techniques. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:59-68 [Conf ] Collin Mulliner , Giovanni Vigna , David Dagon , Wenke Lee Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. [Citation Graph (0, 0)][DBLP ] DIMVA, 2006, pp:91-108 [Conf ] Wei Fan , Wenke Lee , Salvatore J. Stolfo , Matthew Miller A Multiple Model Cost-Sensitive Approach for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ECML, 2000, pp:142-153 [Conf ] Guofei Gu , Prahlad Fogla , David Dagon , Wenke Lee , Boris Skoric Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:527-546 [Conf ] Xinzhou Qin , Wenke Lee Discovering Novel Attack Strategies from INFOSEC Alerts. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:439-456 [Conf ] David Dagon , Wenke Lee , Richard J. Lipton Protecting Secret Data from Insider Attacks. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:16-30 [Conf ] Naser S. Barghouti , John Mocenigo , Wenke Lee Grappa: A GRAPh PAckage in Java. [Citation Graph (0, 0)][DBLP ] Graph Drawing, 1997, pp:336-343 [Conf ] Yi-an Huang , Wei Fan , Wenke Lee , Philip S. Yu Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. [Citation Graph (0, 0)][DBLP ] ICDCS, 2003, pp:478-0 [Conf ] Wei Fan , Matthew Miller , Salvatore J. Stolfo , Wenke Lee , Philip K. Chan Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. [Citation Graph (0, 0)][DBLP ] ICDM, 2001, pp:123-130 [Conf ] Roberto Perdisci , Guofei Gu , Wenke Lee Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. [Citation Graph (0, 0)][DBLP ] ICDM, 2006, pp:488-498 [Conf ] Hongmei Deng , Roger Xu , Jason H. Li , Frank Zhang , Renato Levy , Wenke Lee Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICPADS (1), 2006, pp:613-620 [Conf ] Wenke Lee , Christopher T. Park , Salvatore J. Stolfo Automated Intrusion Detection Using NFR: Methods and Experiences. [Citation Graph (0, 0)][DBLP ] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:63-72 [Conf ] João B. D. Cabrera , Lundy M. Lewis , Xinzhou Qin , Carlos Gutiérrez , Wenke Lee , Raman K. Mehra Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2003, pp:93-96 [Conf ] Wenke Lee , Salvatore J. Stolfo , Kui W. Mok Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] KDD, 1999, pp:114-124 [Conf ] George F. Riley , Monirul I. Sharif , Wenke Lee Simulating Internet Worms. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2004, pp:268-274 [Conf ] Yongguang Zhang , Wenke Lee Intrusion detection in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2000, pp:275-283 [Conf ] David Dagon , Cliff Zou , Wenke Lee Modeling Botnet Propagation Using Time Zones. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] Yongguang Zhang , Harrick M. Vin , Lorenzo Alvisi , Wenke Lee , Son K. Dao Heterogeneous networking: a new survivability paradigm. [Citation Graph (0, 0)][DBLP ] NSPW, 2001, pp:33-39 [Conf ] Monirul I. Sharif , George F. Riley , Wenke Lee Comparative Study between Analytical Models and Packet-Level Worm Simulations. [Citation Graph (0, 0)][DBLP ] PADS, 2005, pp:88-98 [Conf ] Wenke Lee , João B. D. Cabrera , Ashley Thomas , Niranjan Balwalli , Sunmeet Saluja , Yi Zhang Performance Adaptation in Real-Time Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:252-273 [Conf ] Wenke Lee , Rahul A. Nimbalkar , Kam K. Yee , Sunil B. Patil , Pragneshkumar H. Desai , Thuan T. Tran , Salvatore J. Stolfo A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:49-65 [Conf ] Wenke Lee , Salvatore J. Stolfo Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Xinzhou Qin , Wenke Lee Statistical Causality Analysis of INFOSEC Alert Data. [Citation Graph (0, 0)][DBLP ] RAID, 2003, pp:73-93 [Conf ] David Dagon , Xinzhou Qin , Guofei Gu , Wenke Lee , Julian B. Grizzard , John G. Levine , Henry L. Owen HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:39-58 [Conf ] Jonathon T. Giffin , David Dagon , Somesh Jha , Wenke Lee , Barton P. Miller Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:185-206 [Conf ] Yi-an Huang , Wenke Lee Attack Analysis and Detection for Ad Hoc Routing Protocols. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:125-145 [Conf ] Yi-an Huang , Wenke Lee A cooperative intrusion detection system for ad hoc networks. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:135-147 [Conf ] Henry Hanping Feng , Jonathon T. Giffin , Yong Huang , Somesh Jha , Wenke Lee , Barton P. Miller Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf ] Henry Hanping Feng , Oleg M. Kolesnikov , Prahlad Fogla , Wenke Lee , Weibo Gong Anomaly Detection Using Call Stack Information. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:62-0 [Conf ] Wenke Lee , Salvatore J. Stolfo , Kui W. Mok A Data Mining Framework for Building Intrusion Detection Models. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:120-132 [Conf ] Wenke Lee , Dong Xiang Information-Theoretic Measures for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:130-143 [Conf ] Roberto Perdisci , David Dagon , Wenke Lee , Prahlad Fogla , Monirul I. Sharif MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:17-31 [Conf ] David Cash , Yan Zong Ding , Yevgeniy Dodis , Wenke Lee , Richard J. Lipton , Shabsi Walfish Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:479-498 [Conf ] Wenke Lee , Salvatore J. Stolfo , Kui W. Mok Adaptive Intrusion Detection: A Data Mining Approach. [Citation Graph (0, 0)][DBLP ] Artif. Intell. Rev., 2000, v:14, n:6, pp:533-567 [Journal ] Wenke Lee , Wei Fan , Matthew Miller , Salvatore J. Stolfo , Erez Zadok Toward Cost-Sensitive Modeling for Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:1/2, pp:5-22 [Journal ] João B. D. Cabrera , Lundy M. Lewis , Xinzhou Qin , Wenke Lee , Raman K. Mehra Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2002, v:10, n:2, pp:- [Journal ] Wenke Lee , Gail E. Kaiser Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. [Citation Graph (0, 0)][DBLP ] Journal of Systems Integration, 1999, v:9, n:4, pp:329-358 [Journal ] Wei Fan , Matthew Miller , Salvatore J. Stolfo , Wenke Lee , Philip K. Chan Using artificial anomalies to detect unknown and known network intrusions. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2004, v:6, n:5, pp:507-527 [Journal ] Wenke Lee Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2002, v:4, n:2, pp:35-42 [Journal ] Wenke Lee , Wei Fan Mining System Audit Data: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2001, v:30, n:4, pp:35-44 [Journal ] Salvatore J. Stolfo , Wenke Lee , Philip K. Chan , Wei Fan , Eleazar Eskin Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2001, v:30, n:4, pp:5-14 [Journal ] Wenke Lee , Salvatore J. Stolfo A framework for constructing features and models for intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:227-261 [Journal ] Prahlad Fogla , Wenke Lee q-Gram Matching Using Tree Models. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2006, v:18, n:4, pp:433-447 [Journal ] Paul Royal , Mitch Halpin , David Dagon , Robert Edmonds , Wenke Lee PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:289-300 [Conf ] Monirul I. Sharif , Kapil Singh , Jonathon T. Giffin , Wenke Lee Understanding Precision in Host Based Intrusion Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:21-41 [Conf ] Secure and Flexible Monitoring of Virtual Machines. [Citation Graph (, )][DBLP ] A Taxonomy of Botnet Structures. [Citation Graph (, )][DBLP ] McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. [Citation Graph (, )][DBLP ] Active Botnet Probing to Identify Obscure Command and Control Channels. [Citation Graph (, )][DBLP ] Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. [Citation Graph (, )][DBLP ] Principled reasoning and practical applications of alert fusion in intrusion detection systems. [Citation Graph (, )][DBLP ] Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. [Citation Graph (, )][DBLP ] Ether: malware analysis via hardware virtualization extensions. [Citation Graph (, )][DBLP ] Secure in-VM monitoring using hardware virtualization. [Citation Graph (, )][DBLP ] Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP ] Evaluating Bluetooth as a Medium for Botnet Command and Control. [Citation Graph (, )][DBLP ] Evaluating email's feasibility for botnet command and control. [Citation Graph (, )][DBLP ] WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. [Citation Graph (, )][DBLP ] Eureka: A Framework for Enabling Static Malware Analysis. [Citation Graph (, )][DBLP ] On the Secrecy of Spread-Spectrum Flow Watermarks. [Citation Graph (, )][DBLP ] Impeding Malware Analysis Using Conditional Code Obfuscation. [Citation Graph (, )][DBLP ] Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP ] BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. [Citation Graph (, )][DBLP ] K-Tracer: A System for Extracting Kernel Malware Behavior. [Citation Graph (, )][DBLP ] Recursive DNS Architectures and Vulnerability Implications. [Citation Graph (, )][DBLP ] Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. [Citation Graph (, )][DBLP ] BLADE: Slashing the Invisible Channel of Drive-by Download Malware. [Citation Graph (, )][DBLP ] A Centralized Monitoring Infrastructure for Improving DNS Security. [Citation Graph (, )][DBLP ] On the Incoherencies in Web Browser Access Control Policies. [Citation Graph (, )][DBLP ] Automatic Reverse Engineering of Malware Emulators. [Citation Graph (, )][DBLP ] Lares: An Architecture for Secure Active Monitoring Using Virtualization. [Citation Graph (, )][DBLP ] BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. [Citation Graph (, )][DBLP ] Hotspot-based traceback for mobile ad hoc networks. [Citation Graph (, )][DBLP ] Integrating intrusion detection and network management. [Citation Graph (, )][DBLP ] McPAD: A multiple classifier system for accurate payload-based anomaly detection. [Citation Graph (, )][DBLP ] Dynamic Trust Management. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.009secs