![]() | 2009 | |
---|---|---|
84 | ![]() ![]() ![]() ![]() ![]() ![]() | David A. Basin, Srdjan Capkun, Wenke Lee: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 ACM 2009 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi: Secure in-VM monitoring using hardware virtualization. ACM Conference on Computer and Communications Security 2009: 477-487 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang: Mapping kernel objects to enable systematic integrity checking. ACM Conference on Computer and Communications Security 2009: 555-565 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee: Active Botnet Probing to Identify Obscure Command and Control Channels. ACSAC 2009: 241-253 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee: Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. ACSAC 2009: 311-320 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee: WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Automatic Reverse Engineering of Malware Emulators. IEEE Symposium on Security and Privacy 2009: 94-109 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrea Lanzi, Monirul I. Sharif, Wenke Lee: K-Tracer: A System for Extracting Kernel Malware Behavior. NDSS 2009 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee: Recursive DNS Architectures and Vulnerability Implications. NDSS 2009 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee: BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee: McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53(6): 864-881 (2009) |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee: Dynamic Trust Management. IEEE Computer 42(2): 44-52 (2009) |
2008 | ||
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Cliff Wang, David Dagon: Botnet Detection: Countering the Largest Security Threat Springer 2008 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ACM Conference on Computer and Communications Security 2008: 211-222 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee: Ether: malware analysis via hardware virtualization extensions. ACM Conference on Computer and Communications Security 2008: 51-62 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Perdisci, Andrea Lanzi, Wenke Lee: McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Alvaro A. Cárdenas, Wenke Lee: Principled reasoning and practical applications of alert fusion in intrusion detection systems. ASIACCS 2008: 136-147 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee: Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Monirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee: Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Bryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee: Lares: An Architecture for Secure Active Monitoring Using Virtualization. IEEE Symposium on Security and Privacy 2008: 233-247 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Junjie Zhang, Wenke Lee: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS 2008 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee: Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. NDSS 2008 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Impeding Malware Analysis Using Conditional Code Obfuscation. NDSS 2008 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Martim Carbone, Wenke Lee, Diego Zamboni: Taming Virtualization. IEEE Security & Privacy 6(1): 65-67 (2008) |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Perdisci, Andrea Lanzi, Wenke Lee: Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters 29(14): 1941-1946 (2008) |
2007 | ||
58 | ![]() ![]() ![]() ![]() ![]() ![]() | David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Bryan D. Payne, Wenke Lee: Secure and Flexible Monitoring of Virtual Machines. ACSAC 2007: 385-397 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee: Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Bryan D. Payne, Reiner Sailer, Ramón Cáceres, Ronald Perez, Wenke Lee: A layered approach to simplified access control in virtualized systems. Operating Systems Review 41(4): 12-19 (2007) |
2006 | ||
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Prahlad Fogla, Wenke Lee: Evading network anomaly detection systems: formal reasoning and practical techniques. ACM Conference on Computer and Communications Security 2006: 59-68 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough: DSO: Dependable Signing Overlay. ACNS 2006: 33-49 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee: PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee: Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | David Dagon, Cliff Changchun Zou, Wenke Lee: Modeling Botnet Propagation Using Time Zones. NDSS 2006 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Prahlad Fogla, Wenke Lee: q-Gram Matching Using Tree Models. IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006) |
2005 | ||
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee: Anomalous path detection with hardware support. CASES 2005: 43-54 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | David Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Monirul I. Sharif, George F. Riley, Wenke Lee: Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-an Huang, Wenke Lee: Hotspot-based traceback for mobile ad hoc networks. Workshop on Wireless Security 2005: 43-54 |
2004 | ||
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinzhou Qin, Wenke Lee: Attack Plan Recognition and Prediction Using Causal Networks. ACSAC 2004: 370-379 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinzhou Qin, Wenke Lee: Discovering Novel Attack Strategies from INFOSEC Alerts. ESORICS 2004: 439-456 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194- |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | George F. Riley, Monirul I. Sharif, Wenke Lee: Simulating Internet Worms. MASCOTS 2004: 268-274 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-an Huang, Wenke Lee: Attack Analysis and Detection for Ad Hoc Routing Protocols. RAID 2004: 125-145 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004) |
2003 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ICDCS 2003: 478- |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong: Anomaly Detection Using Call Stack Information. IEEE Symposium on Security and Privacy 2003: 62- |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinzhou Qin, Wenke Lee: Statistical Causality Analysis of INFOSEC Alert Data. RAID 2003: 73-93 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-an Huang, Wenke Lee: A cooperative intrusion detection system for ad hoc networks. SASN 2003: 135-147 |
2002 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera: Integrating intrusion detection and network management. NOMS 2002: 329-344 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang: Performance Adaptation in Real-Time Intrusion Detection Systems. RAID 2002: 252-273 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. J. Network Syst. Manage. 10(2): (2002) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002) |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee: Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. SIGKDD Explorations 4(2): 35-42 (2002) |
2001 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Ludovic Mé, Andreas Wespi: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings Springer 2001 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Dong Xiang: Information-Theoretic Measures for Anomaly Detection. IEEE Symposium on Security and Privacy 2001: 130-143 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao: Heterogeneous networking: a new survivability paradigm. NSPW 2001: 33-39 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Wei Fan: Mining System Audit Data: Opportunities and Challenges. SIGMOD Record 30(4): 35-44 (2001) |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001) |
2000 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongguang Zhang, Wenke Lee: Intrusion detection in wireless ad-hoc networks. MOBICOM 2000: 275-283 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000) |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000) |
1999 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenke Lee, Gail E. Kaiser: Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. Journal of Systems Integration 9(4): 329-358 (1999) |
1998 | ||
3 |