Wenke Lee
Wenke Lee
Professor of Computer Science at Georgia Tech
Verified email at cc.gatech.edu - Homepage
Title
Cited by
Cited by
Year
Data mining approaches for intrusion detection
W Lee, SJ Stolfo
Proceedings of the 7th USENIX Security Symposium, 1998
20201998
A data mining framework for building intrusion detection models
W Lee, SJ Stolfo, KW Mok
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
19261999
Intrusion detection in wireless ad-hoc networks
Y Zhang, W Lee
Proceedings of the 6th annual international conference on Mobile computing …, 2000
17462000
BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
Proceedings of the 17th USENIX Security Symposium, 139-154, 2008
14492008
A framework for constructing features and models for intrusion detection systems
W Lee, SJ Stolfo
ACM transactions on Information and system security (TiSSEC) 3 (4), 227-261, 2000
11982000
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
Proceedings of the 15th Network and Distributed System Security Symposium, 2008
11242008
Bothunter: Detecting malware infection through ids-driven dialog correlation
G Gu, P Porras, V Yegneswaran, M Fong, W Lee
Proceedings of 16th USENIX Security Symposium, 12, 2007
10942007
Intrusion detection techniques for mobile wireless networks
Y Zhang, W Lee, YA Huang
Wireless Networks 9 (5), 545-556, 2003
10432003
Ether: malware analysis via hardware virtualization extensions
A Dinaburg, P Royal, M Sharif, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
9352008
Information-theoretic measures for anomaly detection
W Lee, D Xiang
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 130-143, 2000
8442000
Chex: statically vetting android apps for component hijacking vulnerabilities
L Lu, Z Li, Z Wu, W Lee, G Jiang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7482012
A cooperative intrusion detection system for ad hoc networks
Y Huang, W Lee
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
7462003
Method and system for using intelligent agents for financial transactions, services, accounting, and advice
D Schutzer, WH Forster Jr, H Hu, W Lee, SJ Stolfo, W Fan
US Patent 5,920,848, 1999
6831999
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
6802000
Lares: An architecture for secure active monitoring using virtualization
BD Payne, M Carbone, M Sharif, W Lee
2008 IEEE Symposium on Security and Privacy (sp 2008), 233-247, 2008
6372008
Anomaly detection using call stack information
HH Feng, OM Kolesnikov, P Fogla, W Lee, W Gong
Security and Privacy, 2003. Proceedings. 2003 IEEE Symposium on, 62-75, 2003
5932003
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou II, S Abu-Nimeh, W Lee, ...
USENIX Security Symposium, 491-506, 2012
5582012
Building a dynamic reputation system for DNS
M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster
19th USENIX Security Symposium, 2010
5562010
Modeling Botnet Propagation Using Time Zones.
D Dagon, CC Zou, W Lee
NDSS 6, 2-13, 2006
5472006
Adaptive intrusion detection: A data mining approach
W Lee, SJ Stolfo, KW Mok
Artificial Intelligence Review 14 (6), 533-567, 2000
5352000
The system can't perform the operation now. Try again later.
Articles 1–20