Wenke Lee Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
84no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid A. Basin, Srdjan Capkun, Wenke Lee: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 ACM 2009
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMonirul I. Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi: Secure in-VM monitoring using hardware virtualization. ACM Conference on Computer and Communications Security 2009: 477-487
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMartim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang: Mapping kernel objects to enable systematic integrity checking. ACM Conference on Computer and Communications Security 2009: 555-565
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee: Active Botnet Probing to Identify Obscure Command and Control Channels. ACSAC 2009: 241-253
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Igino Corona, David Dagon, Wenke Lee: Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. ACSAC 2009: 311-320
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee: WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12
78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMonirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Automatic Reverse Engineering of Malware Emulators. IEEE Symposium on Security and Privacy 2009: 94-109
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndrea Lanzi, Monirul I. Sharif, Wenke Lee: K-Tracer: A System for Extracting Kernel Malware Behavior. NDSS 2009
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee: Recursive DNS Architectures and Vulnerability Implications. NDSS 2009
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLong Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee: BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352
74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee: McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53(6): 864-881 (2009)
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee: Dynamic Trust Management. IEEE Computer 42(2): 44-52 (2009)
2008
72no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Cliff Wang, David Dagon: Botnet Detection: Countering the Largest Security Threat Springer 2008
71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ACM Conference on Computer and Communications Security 2008: 211-222
70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLArtem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee: Ether: malware analysis via hardware virtualization extensions. ACM Conference on Computer and Communications Security 2008: 51-62
69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Andrea Lanzi, Wenke Lee: McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Alvaro A. Cárdenas, Wenke Lee: Principled reasoning and practical applications of alert fusion in intrusion detection systems. ASIACCS 2008: 136-147
67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee: Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMonirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee: Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee: Lares: An Architecture for Secure Active Monitoring Using Virtualization. IEEE Symposium on Security and Privacy 2008: 233-247
64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Junjie Zhang, Wenke Lee: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS 2008
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Dagon, Niels Provos, Christopher P. Lee, Wenke Lee: Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. NDSS 2008
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMonirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Impeding Malware Analysis Using Conditional Code Obfuscation. NDSS 2008
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154
60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMartim Carbone, Wenke Lee, Diego Zamboni: Taming Virtualization. IEEE Security & Privacy 6(1): 65-67 (2008)
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Andrea Lanzi, Wenke Lee: Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters 29(14): 1941-1946 (2008)
2007
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBryan D. Payne, Wenke Lee: Secure and Flexible Monitoring of Virtual Machines. ACSAC 2007: 385-397
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMonirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee: Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBryan D. Payne, Reiner Sailer, Ramón Cáceres, Ronald Perez, Wenke Lee: A layered approach to simplified access control in virtualized systems. Operating Systems Review 41(4): 12-19 (2007)
2006
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPrahlad Fogla, Wenke Lee: Evading network anomaly detection systems: formal reasoning and practical techniques. ACM Conference on Computer and Communications Security 2006: 59-68
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough: DSO: Dependable Signing Overlay. ACNS 2006: 33-49
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee: PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCollin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee: Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Dagon, Cliff Changchun Zou, Wenke Lee: Modeling Botnet Propagation Using Time Zones. NDSS 2006
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPrahlad Fogla, Wenke Lee: q-Gram Matching Using Tree Models. IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006)
2005
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee: Anomalous path detection with hardware support. CASES 2005: 43-54
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMonirul I. Sharif, George F. Riley, Wenke Lee: Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi-an Huang, Wenke Lee: Hotspot-based traceback for mobile ad hoc networks. Workshop on Wireless Security 2005: 43-54
2004
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinzhou Qin, Wenke Lee: Attack Plan Recognition and Prediction Using Causal Networks. ACSAC 2004: 370-379
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinzhou Qin, Wenke Lee: Discovering Novel Attack Strategies from INFOSEC Alerts. ESORICS 2004: 439-456
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHenry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194-
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGeorge F. Riley, Monirul I. Sharif, Wenke Lee: Simulating Internet Worms. MASCOTS 2004: 268-274
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi-an Huang, Wenke Lee: Attack Analysis and Detection for Ad Hoc Routing Protocols. RAID 2004: 125-145
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004)
2003
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ICDCS 2003: 478-
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHenry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong: Anomaly Detection Using Call Stack Information. IEEE Symposium on Security and Privacy 2003: 62-
27no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoão B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinzhou Qin, Wenke Lee: Statistical Causality Analysis of INFOSEC Alert Data. RAID 2003: 73-93
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYi-an Huang, Wenke Lee: A cooperative intrusion detection system for ad hoc networks. SASN 2003: 135-147
2002
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera: Integrating intrusion detection and network management. NOMS 2002: 329-344
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang: Performance Adaptation in Real-Time Intrusion Detection Systems. RAID 2002: 252-273
22no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoão B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. J. Network Syst. Manage. 10(2): (2002)
21no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002)
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee: Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. SIGKDD Explorations 4(2): 35-42 (2002)
2001
19no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Ludovic Mé, Andreas Wespi: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings Springer 2001
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Dong Xiang: Information-Theoretic Measures for Anomaly Detection. IEEE Symposium on Security and Privacy 2001: 130-143
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao: Heterogeneous networking: a new survivability paradigm. NSPW 2001: 33-39
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Wei Fan: Mining System Audit Data: Opportunities and Challenges. SIGMOD Record 30(4): 35-44 (2001)
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSalvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001)
2000
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYongguang Zhang, Wenke Lee: Intrusion detection in wireless ad-hoc networks. MOBICOM 2000: 275-283
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000)
9no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000)
1999
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenke Lee, Gail E. Kaiser: Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. Journal of Systems Integration 9(4): 329-358 (1999)
1998
3