Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Wenke Lee
2010 – today
- 2013
[c96]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee: The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013
[c95]Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee: Intention and Origination: An Inside Look at Large-Scale Bot Queries. NDSS 2013- 2012
[c94]Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang: CHEX: statically vetting Android apps for component hijacking vulnerabilities. ACM Conference on Computer and Communications Security 2012: 229-240
[c93]Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee: Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. RAID 2012: 22-41
[c92]Kapil Singh, Helen J. Wang, Alexander Moshchuk, Collin Jackson, Wenke Lee: Practical end-to-end web content integrity. WWW 2012: 659-668
[i2]Xinyu Xing, Junho Ahn, Wenke Lee, Richard Han, Shivakant Mishra: An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services. CoRR abs/1204.2774 (2012)- 2011
[c91]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee: Understanding the prevalence and use of alternative plans in malware with network games. ACSAC 2011: 1-10
[c90]Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang: Exposing invisible timing-based traffic watermarks with BACKLIT. ACSAC 2011: 197-206
[c89]Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster: Boosting the scalability of botnet detection using adaptive traffic sampling. ASIACCS 2011: 124-134
[c88]Long Lu, Roberto Perdisci, Wenke Lee: SURF: detecting and measuring search poisoning. ACM Conference on Computer and Communications Security 2011: 467-476
[c87]Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo: Detecting stealthy P2P botnets using statistical traffic fingerprints. DSN 2011: 121-132
[c86]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee: A combinatorial approach to network covert communications with applications in Web Leaks. DSN 2011: 474-485
[c85]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci: HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. NDSS 2011
[c84]Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee: Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. IEEE Symposium on Security and Privacy 2011: 297-312
[c83]Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon: Detecting Malware Domains at the Upper DNS Hierarchy. USENIX Security Symposium 2011
[c82]Junjie Zhang, Christian Seifert, Jack W. Stokes, Wenke Lee: ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads. WWW 2011: 187-196- 2010
[c81]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee: BLADE: an attack-agnostic approach for preventing drive-by malware infections. ACM Conference on Computer and Communications Security 2010: 440-450
[c80]
[c79]Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee: Evaluating Bluetooth as a Medium for Botnet Command and Control. DIMVA 2010: 61-80
[c78]Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee: On the Secrecy of Spread-Spectrum Flow Watermarks. ESORICS 2010: 232-248
[c77]Roberto Perdisci, Wenke Lee, Nick Feamster: Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. NSDI 2010: 391-404
[c76]Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor: A Centralized Monitoring Infrastructure for Improving DNS Security. RAID 2010: 18-37
[c75]Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee: On the Incoherencies in Web Browser Access Control Policies. IEEE Symposium on Security and Privacy 2010: 463-478
[c74]Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster: Building a Dynamic Reputation System for DNS. USENIX Security Symposium 2010: 273-290
2000 – 2009
- 2009
[j15]Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee: McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53(6): 864-881 (2009)
[j14]Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee: Dynamic Trust Management. IEEE Computer 42(2): 44-52 (2009)
[c73]Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee: Active Botnet Probing to Identify Obscure Command and Control Channels. ACSAC 2009: 241-253
[c72]Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee: Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. ACSAC 2009: 311-320
[c71]Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi: Secure in-VM monitoring using hardware virtualization. ACM Conference on Computer and Communications Security 2009: 477-487
[c70]Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang: Mapping kernel objects to enable systematic integrity checking. ACM Conference on Computer and Communications Security 2009: 555-565
[c69]Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee: WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12
[c68]David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee: Recursive DNS Architectures and Vulnerability Implications. NDSS 2009
[c67]Andrea Lanzi, Monirul I. Sharif, Wenke Lee: K-Tracer: A System for Extracting Kernel Malware Behavior. NDSS 2009
[c66]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee: BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352
[c65]Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Automatic Reverse Engineering of Malware Emulators. IEEE Symposium on Security and Privacy 2009: 94-109
[c64]Kapil Singh, Sumeer Bhola, Wenke Lee: xBook: Redesigning Privacy Control in Social Networking Platforms. USENIX Security Symposium 2009: 249-266
[e3]David A. Basin, Srdjan Capkun, Wenke Lee (Eds.): Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. ACM 2009, ISBN 978-1-60558-460-7- 2008
[j13]Martim Carbone, Wenke Lee, Diego Zamboni: Taming Virtualization. IEEE Security & Privacy 6(1): 65-67 (2008)
[j12]Roberto Perdisci, Andrea Lanzi, Wenke Lee: Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters 29(14): 1941-1946 (2008)
[c63]Roberto Perdisci, Andrea Lanzi, Wenke Lee: McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310
[c62]Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee: Ether: malware analysis via hardware virtualization extensions. ACM Conference on Computer and Communications Security 2008: 51-62
[c61]Guofei Gu, Alvaro A. Cárdenas, Wenke Lee: Principled reasoning and practical applications of alert fusion in intrusion detection systems. ASIACCS 2008: 136-147
[c60]David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ACM Conference on Computer and Communications Security 2008: 211-222
[c59]Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee: Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385
[c58]Monirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee: Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500
[c57]David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee: Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. NDSS 2008
[c56]Guofei Gu, Junjie Zhang, Wenke Lee: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS 2008
[c55]Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee: Impeding Malware Analysis Using Conditional Code Obfuscation. NDSS 2008
[c54]Bryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee: Lares: An Architecture for Secure Active Monitoring Using Virtualization. IEEE Symposium on Security and Privacy 2008: 233-247
[c53]Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154
[e2]Wenke Lee, Cliff Wang, David Dagon (Eds.): Botnet Detection: Countering the Largest Security Threat. Advances in Information Security 36, Springer 2008, ISBN 978-0-387-68768-1- 2007
[j11]Bryan D. Payne, Reiner Sailer, Ramón Cáceres, Ronald Perez, Wenke Lee: A layered approach to simplified access control in virtualized systems. Operating Systems Review 41(4): 12-19 (2007)
[c52]David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339
[c51]
[c50]Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee: Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41
[c49]Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee: Misleading and defeating importance-scanning malware propagation. SecureComm 2007: 250-259
[c48]Takehiro Takahashi, Wenke Lee: An assessment of VoIP covert channel threats. SecureComm 2007: 371-380
[c47]David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498- 2006
[j10]Prahlad Fogla, Wenke Lee: q-Gram Matching Using Tree Models. IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006)
[c46]Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough: DSO: Dependable Signing Overlay. ACNS 2006: 33-49
[c45]Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee: PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300
[c44]Prahlad Fogla, Wenke Lee: Evading network anomaly detection systems: formal reasoning and practical techniques. ACM Conference on Computer and Communications Security 2006: 59-68
[c43]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101
[c42]Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
[c41]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546
[c40]Calton Pu, Steve Webb, Oleg M. Kolesnikov, Wenke Lee, Richard J. Lipton: Towards the integration of diverse spam filtering techniques. GrC 2006: 17-20
[c39]Roberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498
[c38]Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee: Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620
[c37]David Dagon, Cliff Changchun Zou, Wenke Lee: Modeling Botnet Propagation Using Time Zones. NDSS 2006
[c36]Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31- 2005
[c35]Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee: Anomalous path detection with hardware support. CASES 2005: 43-54
[c34]David Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30
[c33]Monirul I. Sharif, George F. Riley, Wenke Lee: Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98
[c32]Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206
[c31]Yongguang Zhang, Yi-an Huang, Wenke Lee: An Extensible Environment for Evaluating Secure MANET. SecureComm 2005: 339-352
[c30]Yi-an Huang, Wenke Lee: Hotspot-based traceback for mobile ad hoc networks. Workshop on Wireless Security 2005: 43-54
[i1]David Cash, Yan Zong Ding, Wenke Lee, Richard J. Lipton: Intrusion-Resilient Authentication in the Limited Communication Model. IACR Cryptology ePrint Archive 2005: 409 (2005)- 2004
[j9]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004)
[c29]Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145
[c28]Xinzhou Qin, Wenke Lee: Attack Plan Recognition and Prediction Using Causal Networks. ACSAC 2004: 370-379
[c27]Xinzhou Qin, Wenke Lee: Discovering Novel Attack Strategies from INFOSEC Alerts. ESORICS 2004: 439-456
[c26]
[c25]David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
[c24]Yi-an Huang, Wenke Lee: Attack Analysis and Detection for Ad Hoc Routing Protocols. RAID 2004: 125-145
[c23]Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194-- 2003
[c22]Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ICDCS 2003: 478-
[c21]João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96
[c20]
[c19]Yi-an Huang, Wenke Lee: A cooperative intrusion detection system for ad hoc networks. SASN 2003: 135-147
[c18]Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong: Anomaly Detection Using Call Stack Information. IEEE Symposium on Security and Privacy 2003: 62-- 2002
[j8]Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002)
[j7]João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra: Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. J. Network Syst. Manage. 10(2): 225-254 (2002)
[j6]Wenke Lee: Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. SIGKDD Explorations 4(2): 35-42 (2002)
[c17]Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera: Integrating intrusion detection and network management. NOMS 2002: 329-344
[c16]Mustaque Ahamad, Leo Mark, Wenke Lee, Edward Omicienski, Andre dos Santos, Ling Liu, Calton Pu: Guarding the next Internet frontier: countering denial of information attacks. NSPW 2002: 136-143
[c15]Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang: Performance Adaptation in Real-Time Intrusion Detection Systems. RAID 2002: 252-273- 2001
[j5]Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001)
[j4]Wenke Lee, Wei Fan: Mining System Audit Data: Opportunities and Challenges. SIGMOD Record 30(4): 35-44 (2001)
[c14]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130
[c13]João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Ravil K. Prasanth, Ravi Ravichandran, Raman K. Mehra: Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables - A Feasibility Study. Integrated Network Management 2001: 609-622
[c12]Yongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao: Heterogeneous networking: a new survivability paradigm. NSPW 2001: 33-39
[c11]Wenke Lee, Dong Xiang: Information-Theoretic Measures for Anomaly Detection. IEEE Symposium on Security and Privacy 2001: 130-143
[e1]Wenke Lee, Ludovic Mé, Andreas Wespi (Eds.): Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings. Lecture Notes in Computer Science 2212, Springer 2001, ISBN 3-540-42702-3- 2000
[j3]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000)
[j2]Wenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000)
[c10]Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153
[c9]
[c8]Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65
1990 – 1999
- 1999
[j1]Wenke Lee, Gail E. Kaiser: Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. Journal of Systems Integration 9(4): 329-358 (1999)
[c7]Wenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72
[c6]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124
[c5]Wenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999
[c4]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132- 1998
[c3]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72- 1997
[c2]Naser S. Barghouti, John M. Mocenigo, Wenke Lee: Grappa: A GRAPh PAckage in Java. Graph Drawing 1997: 336-343
[c1]Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan: JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:18 CEST by the dblp team



