The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhuowei Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhuowei Li, Amitabha Das, Jianying Zhou
    Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:222-237 [Conf]
  2. Zhuowei Li, Amitabha Das
    Visualizing and Identifying Intrusion Context from System Calls Trace. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:61-70 [Conf]
  3. XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
    Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf]
  4. Zhuowei Li, Amitabha Das, Sukumar Nandi
    Utilizing Statistical Characteristics of N-grams for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CW, 2003, pp:486-493 [Conf]
  5. Zhuowei Li, Amitabha Das
    M of N Features vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:994-1003 [Conf]
  6. Zhuowei Li, Amitabha Das, Sabu Emmanuel
    Model Redundancy vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:217-229 [Conf]
  7. Zhuowei Li, Amitabha Das, Jianying Zhou
    USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:702-712 [Conf]
  8. Zhuowei Li, Amitabha Das
    Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  9. Zhuowei Li, Amitabha Das
    Analyzing and evaluating dynamics in stide performance for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2006, v:19, n:7, pp:576-591 [Journal]
  10. Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
    SpyShield: Preserving Privacy from Spy Add-Ons. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:296-316 [Conf]
  11. Zhuowei Li, Amitabha Das, Jianying Zhou
    Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:54-64 [Conf]

  12. Towards automatic reverse engineering of software security configurations. [Citation Graph (, )][DBLP]

  13. AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP]

  14. PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP]

  15. Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP]

  16. Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002