Wenke Lee
Wenke Lee
Professor of Computer Science at Georgia Tech
Email verificata su cc.gatech.edu - Home page
TitoloCitata daAnno
Data mining approaches for intrusion detection
W Lee, SJ Stolfo
Proceedings of the 7th USENIX Security Symposium, 1998
18411998
A data mining framework for building intrusion detection models
W Lee, SJ Stolfo, KW Mok
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
17491999
Intrusion detection in wireless ad-hoc networks
Y Zhang, W Lee
Proceedings of the 6th annual international conference on Mobile computing …, 2000
16372000
BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
Proceedings of the 17th USENIX Security Symposium, 139-154, 2008
12452008
A framework for constructing features and models for intrusion detection systems
W Lee, SJ Stolfo
ACM transactions on Information and system security (TiSSEC) 3 (4), 227-261, 2000
10712000
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
Proceedings of the 15th Network and Distributed System Security Symposium, 2008
9692008
Bothunter: Detecting malware infection through ids-driven dialog correlation
G Gu, P Porras, V Yegneswaran, M Fong, W Lee
Proceedings of 16th USENIX Security Symposium, 12, 2007
9642007
Intrusion detection techniques for mobile wireless networks
Y Zhang, W Lee, YA Huang
Wireless Networks 9 (5), 545-556, 2003
9552003
Ether: malware analysis via hardware virtualization extensions
A Dinaburg, P Royal, M Sharif, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
7942008
Information-theoretic measures for anomaly detection
W Lee, D Xiang
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 130-143, 2000
7492000
A cooperative intrusion detection system for ad hoc networks
Y Huang, W Lee
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
6842003
Method and system for using intelligent agents for financial transactions, services, accounting, and advice
D Schutzer, WH Forster Jr, H Hu, W Lee, SJ Stolfo, W Fan
US Patent 5,920,848, 1999
6711999
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
6062000
Chex: statically vetting android apps for component hijacking vulnerabilities
L Lu, Z Li, Z Wu, W Lee, G Jiang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5892012
Lares: An architecture for secure active monitoring using virtualization
BD Payne, M Carbone, M Sharif, W Lee
2008 IEEE Symposium on Security and Privacy (sp 2008), 233-247, 2008
5692008
Anomaly detection using call stack information
HH Feng, OM Kolesnikov, P Fogla, W Lee, W Gong
Security and Privacy, 2003. Proceedings. 2003 IEEE Symposium on, 62-75, 2003
5392003
Modeling Botnet Propagation Using Time Zones.
D Dagon, CC Zou, W Lee
NDSS 6, 2-13, 2006
4912006
Secure and flexible monitoring of virtual machines
BD Payne, DPA Martim, W Lee
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
4782007
Adaptive intrusion detection: A data mining approach
W Lee, SJ Stolfo, KW Mok
Artificial Intelligence Review 14 (6), 533-567, 2000
4782000
Learning patterns from unix process execution traces for intrusion detection
W Lee, SJ Stolfo, PK Chan
AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 50-56, 1997
4651997
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20