Wenke Lee
Wenke Lee
Professor of Computer Science at Georgia Tech
Verified email at cc.gatech.edu - Homepage
TitleCited byYear
Data mining approaches for intrusion detection
W Lee, SJ Stolfo
Proceedings of the 7th USENIX Security Symposium, 1998
18951998
A data mining framework for building intrusion detection models
W Lee, SJ Stolfo, KW Mok
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
17961999
Intrusion detection in wireless ad-hoc networks
Y Zhang, W Lee
Proceedings of the 6th annual international conference on Mobile computing …, 2000
16742000
BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
Proceedings of the 17th USENIX Security Symposium, 139-154, 2008
12842008
A framework for constructing features and models for intrusion detection systems
W Lee, SJ Stolfo
ACM transactions on Information and system security (TiSSEC) 3 (4), 227-261, 2000
10992000
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
Proceedings of the 15th Network and Distributed System Security Symposium, 2008
10032008
Bothunter: Detecting malware infection through ids-driven dialog correlation
G Gu, P Porras, V Yegneswaran, M Fong, W Lee
Proceedings of 16th USENIX Security Symposium, 12, 2007
10012007
Intrusion detection techniques for mobile wireless networks
Y Zhang, W Lee, YA Huang
Wireless Networks 9 (5), 545-556, 2003
9892003
Ether: malware analysis via hardware virtualization extensions
A Dinaburg, P Royal, M Sharif, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
8182008
Information-theoretic measures for anomaly detection
W Lee, D Xiang
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 130-143, 2000
7652000
A cooperative intrusion detection system for ad hoc networks
Y Huang, W Lee
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
7072003
Method and system for using intelligent agents for financial transactions, services, accounting, and advice
D Schutzer, WH Forster Jr, H Hu, W Lee, SJ Stolfo, W Fan
US Patent 5,920,848, 1999
6791999
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
6432000
Chex: statically vetting android apps for component hijacking vulnerabilities
L Lu, Z Li, Z Wu, W Lee, G Jiang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
6122012
Lares: An architecture for secure active monitoring using virtualization
BD Payne, M Carbone, M Sharif, W Lee
2008 IEEE Symposium on Security and Privacy (sp 2008), 233-247, 2008
5792008
Anomaly detection using call stack information
HH Feng, OM Kolesnikov, P Fogla, W Lee, W Gong
Security and Privacy, 2003. Proceedings. 2003 IEEE Symposium on, 62-75, 2003
5532003
Modeling Botnet Propagation Using Time Zones.
D Dagon, CC Zou, W Lee
NDSS 6, 2-13, 2006
5092006
Adaptive intrusion detection: A data mining approach
W Lee, SJ Stolfo, KW Mok
Artificial Intelligence Review 14 (6), 533-567, 2000
4922000
Secure and flexible monitoring of virtual machines
BD Payne, DPA Martim, W Lee
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
4832007
Learning patterns from unix process execution traces for intrusion detection
W Lee, SJ Stolfo, PK Chan
AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 50-56, 1997
4741997
The system can't perform the operation now. Try again later.
Articles 1–20