Wenke Lee Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

79 David A. Basin, Srdjan Capkun, Wenke Lee: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 ACM 2009
78EEMonirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Automatic Reverse Engineering of Malware Emulators. IEEE Symposium on Security and Privacy 2009: 94-109
77EEAndrea Lanzi, Monirul I. Sharif, Wenke Lee: K-Tracer: A System for Extracting Kernel Malware Behavior. NDSS 2009
76EEDavid Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee: Recursive DNS Architectures and Vulnerability Implications. NDSS 2009
75EELong Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee: BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352
74EERoberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee: McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53(6): 864-881 (2009)
73EEMatt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee: Dynamic Trust Management. IEEE Computer 42(2): 44-52 (2009)
72 Wenke Lee, Cliff Wang, David Dagon: Botnet Detection: Countering the Largest Security Threat Springer 2008
71EEDavid Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ACM Conference on Computer and Communications Security 2008: 211-222
70EEArtem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee: Ether: malware analysis via hardware virtualization extensions. ACM Conference on Computer and Communications Security 2008: 51-62
69EERoberto Perdisci, Andrea Lanzi, Wenke Lee: McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310
68EEGuofei Gu, Alvaro A. Cárdenas, Wenke Lee: Principled reasoning and practical applications of alert fusion in intrusion detection systems. ASIACCS 2008: 136-147
67EEKapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee: Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385
66EEMonirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee: Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500
65EEBryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee: Lares: An Architecture for Secure Active Monitoring Using Virtualization. IEEE Symposium on Security and Privacy 2008: 233-247
64EEGuofei Gu, Junjie Zhang, Wenke Lee: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS 2008
63EEDavid Dagon, Niels Provos, Christopher P. Lee, Wenke Lee: Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. NDSS 2008
62EEMonirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Impeding Malware Analysis Using Conditional Code Obfuscation. NDSS 2008
61EEGuofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154
60EEMartim Carbone, Wenke Lee, Diego Zamboni: Taming Virtualization. IEEE Security & Privacy 6(1): 65-67 (2008)
59EERoberto Perdisci, Andrea Lanzi, Wenke Lee: Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters 29(14): 1941-1946 (2008)
58EEDavid Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339
57EEBryan D. Payne, Wenke Lee: Secure and Flexible Monitoring of Virtual Machines. ACSAC 2007: 385-397
56EEMonirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee: Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41
55EEDavid Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498
54EEBryan D. Payne, Reiner Sailer, Ramón Cáceres, Ronald Perez, Wenke Lee: A layered approach to simplified access control in virtualized systems. Operating Systems Review 41(4): 12-19 (2007)
53EEPrahlad Fogla, Wenke Lee: Evading network anomaly detection systems: formal reasoning and practical techniques. ACM Conference on Computer and Communications Security 2006: 59-68
52EEGuofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough: DSO: Dependable Signing Overlay. ACNS 2006: 33-49
51EEPaul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee: PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300
50EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101
49EECollin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
48EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546
47EERoberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498
46EEHongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee: Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620
45EERoberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31
44EEDavid Dagon, Cliff Changchun Zou, Wenke Lee: Modeling Botnet Propagation Using Time Zones. NDSS 2006
43EEPrahlad Fogla, Wenke Lee: q-Gram Matching Using Tree Models. IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006)
42EETao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee: Anomalous path detection with hardware support. CASES 2005: 43-54
41EEDavid Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30
40EEMonirul I. Sharif, George F. Riley, Wenke Lee: Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98
39EEJonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206
38EEYi-an Huang, Wenke Lee: Hotspot-based traceback for mobile ad hoc networks. Workshop on Wireless Security 2005: 43-54
37EEGuofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145
36EEXinzhou Qin, Wenke Lee: Attack Plan Recognition and Prediction Using Causal Networks. ACSAC 2004: 370-379
35EEXinzhou Qin, Wenke Lee: Discovering Novel Attack Strategies from INFOSEC Alerts. ESORICS 2004: 439-456
34EEHenry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194-
33EEGeorge F. Riley, Monirul I. Sharif, Wenke Lee: Simulating Internet Worms. MASCOTS 2004: 268-274
32EEYi-an Huang, Wenke Lee: Attack Analysis and Detection for Ad Hoc Routing Protocols. RAID 2004: 125-145
31EEDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
30EEWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004)
29EEYi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ICDCS 2003: 478-
28EEHenry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong: Anomaly Detection Using Call Stack Information. IEEE Symposium on Security and Privacy 2003: 62-
27 João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96
26EEXinzhou Qin, Wenke Lee: Statistical Causality Analysis of INFOSEC Alert Data. RAID 2003: 73-93
25EEYi-an Huang, Wenke Lee: A cooperative intrusion detection system for ad hoc networks. SASN 2003: 135-147
24EEXinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera: Integrating intrusion detection and network management. NOMS 2002: 329-344
23EEWenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang: Performance Adaptation in Real-Time Intrusion Detection Systems. RAID 2002: 252-273
22 João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. J. Network Syst. Manage. 10(2): (2002)
21 Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002)
20EEWenke Lee: Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. SIGKDD Explorations 4(2): 35-42 (2002)
19 Wenke Lee, Ludovic Mé, Andreas Wespi: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings Springer 2001
18EEWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130
17EEWenke Lee, Dong Xiang: Information-Theoretic Measures for Anomaly Detection. IEEE Symposium on Security and Privacy 2001: 130-143
16EEYongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao: Heterogeneous networking: a new survivability paradigm. NSPW 2001: 33-39
15EEWenke Lee, Wei Fan: Mining System Audit Data: Opportunities and Challenges. SIGMOD Record 30(4): 35-44 (2001)
14EESalvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001)
13EEWei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153
12EEYongguang Zhang, Wenke Lee: Intrusion detection in wireless ad-hoc networks. MOBICOM 2000: 275-283
11EEWenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65
10EEWenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000)
9 Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000)
8EEWenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132
7EEWenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124
6EEWenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999
5EEWenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72
4 Wenke Lee, Gail E. Kaiser: Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. Journal of Systems Integration 9(4): 329-358 (1999)
3 Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72
2 Naser S. Barghouti, John M. Mocenigo, Wenke Lee: Grappa: A GRAPh PAckage in Java. Graph Drawing 1997: 336-343
1 Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan: JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81

Coauthor Index

1Lorenzo Alvisi [16]
2Manos Antonakakis [71] [76]
3Davide Ariu [74]
4Niranjan Balwalli [23]
5Naser S. Barghouti [2]
6David A. Basin [79]
7Matt Blaze [73]
8Douglas M. Blough [52]
9João B. D. Cabrera [22] [23] [24] [27]
10Ramón Cáceres [54]
11Srdjan Capkun [79]
12Martim Carbone [60] [65]
13Alvaro A. Cárdenas [68]
14David Cash [55]
15Philip K. Chan [1] [14] [18] [30]
16David Dagon [31] [37] [39] [41] [44] [45] [48] [49] [50] [51] [58] [63] [71] [72] [76]
17Son K. Dao [16]
18Kevin Day [76]
19Hongmei Deng [46]
20Pragneshkumar H. Desai [11]
21Artem Dinaburg [70]
22Yan Zong Ding [55]
23Yevgeniy Dodis [55]
24Robert Edmonds [51]
25Eleazar Eskin [14]
26Dave W. Fan [1]
27Wei Fan [13] [14] [15] [18] [21] [29] [30]
28Henry Hanping Feng [28] [34]
29Prahlad Fogla [28] [43] [45] [48] [50] [52] [53] [74]
30Giorgio Giacinto [74]
31Jonathon T. Giffin [34] [39] [56] [62] [67] [78]
32Weibo Gong [28]
33Julian B. Grizzard [31]
34Guofei Gu [31] [37] [47] [48] [50] [52] [58] [61] [64] [68]
35Carlos Gutiérrez [27]
36Mitch Halpin [51]
37Yi-an Huang [25] [29] [32] [38]
38Yong Huang [34]
39Somesh Jha [34] [39]
40Tatuya Jinmei [71]
41Gail E. Kaiser [4]
42Sampath Kannan [73]
43Angelos D. Keromytis [73]
44Oleg M. Kolesnikov [28]
45Andrea Lanzi [59] [62] [69] [77] [78]
46Christopher P. Lee [58] [63] [76]
47Insup Lee [73]
48John G. Levine [31]
49Renato Levy [46]
50Lundy M. Lewis [22] [24] [27]
51Jason H. Li [46]
52Richard J. Lipton [41] [55]
53Long Lu [75]
54Xiapu Luo [76]
55Ludovic Mé [19]
56Raman K. Mehra [22] [27]
57Barton P. Miller [34] [39]
58Matthew Miller [13] [18] [21] [30]
59John M. Mocenigo [2]
60Kui W. Mok [3] [7] [8] [9]
61Collin Mulliner [49]
62Rahul A. Nimbalkar [11]
63Henry L. Owen [31]
64Santosh Pande [42]
65Christopher T. Park [5]
66Sunil B. Patil [11]
67Bryan D. Payne [54] [57] [65]
68Roberto Perdisci [45] [47] [59] [61] [69] [74]
69Ronald Perez [54]
70Phillip A. Porras [66] [75]
71Andreas L. Prodromidis [1]
72Niels Provos [63]
73Xinzhou Qin [22] [24] [26] [27] [31] [35] [36] [37]
74George F. Riley [33] [37] [40]
75Paul Royal [51] [70]
76Hassen Saïdi [66]
77Reiner Sailer [54]
78Sunmeet Saluja [23]
79Monirul I. Sharif [33] [37] [40] [45] [56] [62] [65] [66] [70] [77] [78]
80Kapil Singh [56] [67]
81Boris Skoric [48] [50]
82Jonathan M. Smith [73]
83Oleg Sokolsky [73]
84Abhinav Srivastava [67]
85Salvatore J. Stolfo [1] [3] [5] [6] [7] [8] [9] [10] [11] [13] [14] [18] [21] [30]
86Ashley Thomas [23]
87Thuan T. Tran [11]
88Shelley Tselepis [1]
89Giovanni Vigna [49]
90Harrick M. Vin [16]
91Paul Vixie [71]
92Shabsi Walfish [55]
93Cliff Wang [72]
94Andreas Wespi [19]
95Dong Xiang [17]
96Roger Xu [46]
97Kam K. Yee [11]
98Vinod Yegneswaran [66] [75]
99Philip S. Yu [29]
100Erez Zadok [21]
101Diego Zamboni [60]
102Frank Zhang [46]
103Junjie Zhang [61] [64]
104Tao Zhang [42]
105Yi Zhang [23]
106Yongguang Zhang [12] [16]
107Xiaotong Zhuang [42]
108Cliff Changchun Zou [44]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)