Data mining approaches for intrusion detection W Lee, SJ Stolfo Proceedings of the 7th USENIX Security Symposium, 1998 | 2173 | 1998 |
A data mining framework for building intrusion detection models W Lee, SJ Stolfo, KW Mok Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999 | 2030 | 1999 |
Intrusion detection in wireless ad-hoc networks Y Zhang, W Lee Proceedings of the 6th annual international conference on Mobile computing …, 2000 | 1778 | 2000 |
BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection G Gu, R Perdisci, J Zhang, W Lee Proceedings of the 17th USENIX Security Symposium, 139-154, 2008 | 1636 | 2008 |
A framework for constructing features and models for intrusion detection systems W Lee, SJ Stolfo ACM transactions on Information and system security (TiSSEC) 3 (4), 227-261, 2000 | 1297 | 2000 |
BotSniffer: Detecting botnet command and control channels in network traffic G Gu, J Zhang, W Lee Proceedings of the 15th Network and Distributed System Security Symposium, 2008 | 1269 | 2008 |
Bothunter: Detecting malware infection through ids-driven dialog correlation G Gu, P Porras, V Yegneswaran, M Fong, W Lee Proceedings of 16th USENIX Security Symposium, 12, 2007 | 1195 | 2007 |
Intrusion detection techniques for mobile wireless networks Y Zhang, W Lee, YA Huang Wireless Networks 9, 545-556, 2003 | 1097 | 2003 |
Ether: malware analysis via hardware virtualization extensions A Dinaburg, P Royal, M Sharif, W Lee Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 1071 | 2008 |
Information-theoretic measures for anomaly detection W Lee, D Xiang Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 130-143, 2000 | 929 | 2000 |
Cost-based modeling for fraud and intrusion detection: Results from the JAM project SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 880 | 2000 |
Chex: statically vetting android apps for component hijacking vulnerabilities L Lu, Z Li, Z Wu, W Lee, G Jiang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 863 | 2012 |
Method and system for using intelligent agents for financial transactions, services, accounting, and advice D Schutzer, WH Forster Jr, H Hu, W Lee, SJ Stolfo, W Fan US Patent 5,920,848, 1999 | 781 | 1999 |
A cooperative intrusion detection system for ad hoc networks Y Huang, W Lee Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 777 | 2003 |
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou II, S Abu-Nimeh, W Lee, ... USENIX Security Symposium, 491-506, 2012 | 738 | 2012 |
Lares: An architecture for secure active monitoring using virtualization BD Payne, M Carbone, M Sharif, W Lee 2008 IEEE Symposium on Security and Privacy (sp 2008), 233-247, 2008 | 686 | 2008 |
Building a dynamic reputation system for DNS M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster 19th USENIX Security Symposium, 2010 | 684 | 2010 |
Anomaly detection using call stack information HH Feng, OM Kolesnikov, P Fogla, W Lee, W Gong Security and Privacy, 2003. Proceedings. 2003 IEEE Symposium on, 62-75, 2003 | 654 | 2003 |
The creation and detection of deepfakes: A survey Y Mirsky, W Lee ACM computing surveys (CSUR) 54 (1), 1-41, 2021 | 617 | 2021 |
Adaptive intrusion detection: A data mining approach W Lee, SJ Stolfo, KW Mok Artificial Intelligence Review 14, 533-567, 2000 | 589 | 2000 |