Topic detection and tracking: event-based information organization J Allan Springer Science & Business Media, 2002 | 1229 | 2002 |
A hidden Markov model information retrieval system DRH Miller, T Leek, RM Schwartz Proceedings of the 22nd annual international ACM SIGIR conference on …, 1999 | 676 | 1999 |
Taint-based directed whitebox fuzzing V Ganesh, T Leek, M Rinard 2009 IEEE 31st International Conference on Software Engineering, 474-484, 2009 | 500 | 2009 |
Virtuoso: Narrowing the semantic gap in virtual machine introspection B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee 2011 IEEE symposium on security and privacy, 297-312, 2011 | 428 | 2011 |
Lava: Large-scale automated vulnerability addition B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ... 2016 IEEE symposium on security and privacy (SP), 110-121, 2016 | 416 | 2016 |
Testing static analysis tools using exploitable buffer overflows from open source code M Zitser, R Lippmann, T Leek Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004 | 385 | 2004 |
Speech and language technologies for audio indexing and retrieval J Makhoul, F Kubala, T Leek, D Liu, L Nguyen, R Schwartz, A Srivastava Proceedings of the IEEE 88 (8), 1338-1353, 2000 | 245 | 2000 |
Information extraction using hidden Markov models TR Leek University of California, San Diego, 1997 | 237 | 1997 |
Phonetic speaker recognition with support vector machines W Campbell, J Campbell, D Reynolds, D Jones, T Leek Advances in neural information processing systems 16, 2003 | 212 | 2003 |
Repeatable reverse engineering with PANDA B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015 | 190 | 2015 |
High-level speaker verification with support vector machines WM Campbell, JR Campbell, DA Reynolds, DA Jones, TR Leek 2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004 | 112 | 2004 |
Tappan zee (north) bridge: mining memory accesses for introspection B Dolan-Gavitt, T Leek, J Hodosh, W Lee Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 110 | 2013 |
Experiences in cyber security education J Werther, M Zhivich, T Leek, N Zeldovich The MIT Lincoln Laboratory Capture-theflag Exercise. In Proceedings of the …, 2011 | 69 | 2011 |
Probabilistic approaches to topic detection and tracking T Leek, R Schwartz, S Sista Topic detection and tracking: event-based information organization, 67-83, 2002 | 68 | 2002 |
BBN at TREC7: Using hidden Markov models for information retrieval DRH Miller, T Leek, RM Schwartz NIST SPECIAL PUBLICATION SP, 133-142, 1999 | 65 | 1999 |
Sok: Enabling security analyses of embedded systems via rehosting A Fasano, T Ballo, M Muench, T Leek, A Bulekov, B Dolan-Gavitt, M Egele, ... Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021 | 60 | 2021 |
Information retrieval system RM Schwartz, DRH Miller, TR Leek US Patent 7,162,468, 2007 | 56 | 2007 |
The fun and future of {CTF} A Davis, T Leek, M Zhivich, K Gwinnup, W Leonard 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014 | 55 | 2014 |
Experiences in Cyber Security Education: The {MIT} Lincoln Laboratory {Capture-the-Flag} Exercise J Werther, M Zhivich, T Leek, N Zeldovich 4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011 | 50 | 2011 |
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis G Severi, T Leek, B Dolan-Gavitt Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018 | 49 | 2018 |