Minerals: using data mining to detect router misconfigurations F Le, S Lee, T Wong, HS Kim, D Newcomb Proceedings of the 2006 SIGCOMM workshop on Mining network data, 293-298, 2006 | 178 | 2006 |
Network monitoring: Present and future S Lee, K Levanti, HS Kim Computer Networks 65, 84-98, 2014 | 172 | 2014 |
Reducing Complexity of Large-Scale Network Configuration Management S Lee Carnegie Mellon University, 2010 | 113 | 2010 |
Detecting network-wide and router-specific misconfigurations through data mining F Le, S Lee, T Wong, HS Kim, D Newcomb IEEE/ACM transactions on networking 17 (1), 66-79, 2008 | 65 | 2008 |
Automatic detection of firewall misconfigurations using firewall and network routing policies RM Oliveira, S Lee, HS Kim IEEE DSN Workshop on Proactive Failure Avoidance, Recovery, and Maintenance …, 2009 | 39 | 2009 |
Smart roads for autonomous accident detection and warnings A Mateen, MZ Hanif, N Khatri, S Lee, SY Nam Sensors 22 (6), 2077, 2022 | 29 | 2022 |
To automate or not to automate: on the complexity of network configuration S Lee, T Wong, HS Kim 2008 IEEE International Conference on Communications, 5726-5731, 2008 | 29 | 2008 |
Secure split assignment trajectory sampling: A malicious router detection system S Lee, T Wong, HS Kim International Conference on Dependable Systems and Networks (DSN'06), 333-342, 2006 | 23 | 2006 |
Improving dependability of network configuration through policy classification S Lee, T Wong, HS Kim 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 16 | 2008 |
NetPiler: Detection of ineffective router configurations S Lee, T Wong, HS Kim IEEE Journal on Selected Areas in Communications 27 (3), 291-301, 2009 | 15 | 2009 |
Event message clustering algorithm for selection of majority message in VANETs N Khatri, S Lee, A Mateen, SY Nam Ieee Access 11, 14621-14635, 2023 | 14 | 2023 |
Estimation of the available bandwidth ratio of a remote link or path segments SY Nam, SJ Kim, S Lee, HS Kim Computer Networks 57 (1), 61-77, 2013 | 14 | 2013 |
Detection of political manipulation in online communities through measures of effort and collaboration S Lee ACM Transactions on the Web (TWEB) 9 (3), 1-24, 2015 | 12 | 2015 |
End-user perspectives of Internet connectivity problems S Lee, HS Kim Computer Networks 56 (6), 1710-1722, 2012 | 12 | 2012 |
Challenges, issues, and recommendations for Blockchain-and cloud-based automotive insurance systems A Mateen, A Khalid, S Lee, SY Nam Applied Sciences 13 (6), 3561, 2023 | 9 | 2023 |
Transfer learning-based intrusion detection system for a controller area network N Khatri, S Lee, SY Nam IEEE Access, 2023 | 8 | 2023 |
File searching on mobile devices D Agrawal, JW Branch, F Le, S Lee, MK Mohania US Patent 9,047,298, 2015 | 8 | 2015 |
Mining diverse opinions M Srivatsa, S Lee, T Abdelzaher MILCOM 2012-2012 IEEE Military Communications Conference, 1-7, 2012 | 7 | 2012 |
Characterization and detection of political manipulation in online communities S Lee Journal of Internet Technology 19 (4), 1131-1142, 2018 | 5 | 2018 |
Improving manageability through reorganization of routing-policy configurations S Lee, T Wong, HS Kim Computer Networks 56 (14), 3192-3205, 2012 | 5 | 2012 |