Follow
Tim Leek
Tim Leek
MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
Topic detection and tracking: event-based information organization
J Allan
Springer Science & Business Media, 2002
12262002
A hidden Markov model information retrieval system
DRH Miller, T Leek, RM Schwartz
Proceedings of the 22nd annual international ACM SIGIR conference on …, 1999
6721999
Taint-based directed whitebox fuzzing
V Ganesh, T Leek, M Rinard
2009 IEEE 31st International Conference on Software Engineering, 474-484, 2009
4952009
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
4272011
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
3982016
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
3822004
Speech and language technologies for audio indexing and retrieval
J Makhoul, F Kubala, T Leek, D Liu, L Nguyen, R Schwartz, A Srivastava
Proceedings of the IEEE 88 (8), 1338-1353, 2000
2422000
Information extraction using hidden Markov models
TR Leek
University of California, San Diego, 1997
2351997
Phonetic speaker recognition with support vector machines
W Campbell, J Campbell, D Reynolds, D Jones, T Leek
Advances in neural information processing systems 16, 2003
2112003
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
1832015
High-level speaker verification with support vector machines
WM Campbell, JR Campbell, DA Reynolds, DA Jones, TR Leek
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
1112004
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1102013
Probabilistic approaches to topic detection and tracking
T Leek, R Schwartz, S Sista
Topic detection and tracking: event-based information organization, 67-83, 2002
682002
Experiences in cyber security education
J Werther, M Zhivich, T Leek, N Zeldovich
The MIT Lincoln Laboratory Capture-theflag Exercise. In Proceedings of the …, 2011
672011
BBN at TREC7: Using hidden Markov models for information retrieval
DRH Miller, T Leek, RM Schwartz
NIST SPECIAL PUBLICATION SP, 133-142, 1999
651999
Information retrieval system
RM Schwartz, DRH Miller, TR Leek
US Patent 7,162,468, 2007
552007
The fun and future of {CTF}
A Davis, T Leek, M Zhivich, K Gwinnup, W Leonard
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
532014
Experiences in Cyber Security Education: The {MIT} Lincoln Laboratory {Capture-the-Flag} Exercise
J Werther, M Zhivich, T Leek, N Zeldovich
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
492011
Coverage maximization using dynamic taint tracing
T Leek, G Baker, R Brown, M Zhivich, R Lippmann
Technical Report 112, MIT Lincoln Laboratory, 2007
472007
Dynamic buffer overflow detection
M Zhivich, T Leek, R Lippmann
Workshop on the evaluation of software defect detection tools 2005, 2005
472005
The system can't perform the operation now. Try again later.
Articles 1–20