|
Search the dblp DataBase
Zhuowei Li:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zhuowei Li, Amitabha Das, Jianying Zhou
Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:222-237 [Conf]
- Zhuowei Li, Amitabha Das
Visualizing and Identifying Intrusion Context from System Calls Trace. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:61-70 [Conf]
- XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf]
- Zhuowei Li, Amitabha Das, Sukumar Nandi
Utilizing Statistical Characteristics of N-grams for Intrusion Detection. [Citation Graph (0, 0)][DBLP] CW, 2003, pp:486-493 [Conf]
- Zhuowei Li, Amitabha Das
M of N Features vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:994-1003 [Conf]
- Zhuowei Li, Amitabha Das, Sabu Emmanuel
Model Redundancy vs. Intrusion Detection. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:217-229 [Conf]
- Zhuowei Li, Amitabha Das, Jianying Zhou
USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] PAKDD, 2005, pp:702-712 [Conf]
- Zhuowei Li, Amitabha Das
Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Zhuowei Li, Amitabha Das
Analyzing and evaluating dynamics in stide performance for intrusion detection. [Citation Graph (0, 0)][DBLP] Knowl.-Based Syst., 2006, v:19, n:7, pp:576-591 [Journal]
- Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
SpyShield: Preserving Privacy from Spy Add-Ons. [Citation Graph (0, 0)][DBLP] RAID, 2007, pp:296-316 [Conf]
- Zhuowei Li, Amitabha Das, Jianying Zhou
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:54-64 [Conf]
Towards automatic reverse engineering of software security configurations. [Citation Graph (, )][DBLP]
AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP]
PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP]
Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP]
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|