2017 - ACM Fellow For contributions to systems and network security, intrusion and anomaly detection and malware analysis
Her Linguistics study typically links adjacent topics like TRACE (psycholinguistics) and Feature (linguistics). Her Feature (linguistics) study frequently links to other fields, such as Linguistics. She integrates Intrusion detection system with Honeypot in her research. She undertakes interdisciplinary study in the fields of Honeypot and Intrusion detection system through her works. Her work blends Computer security and Attack patterns studies together. While working on this project, Wenke Lee studies both Operating system and Embedded system. She combines Embedded system and Operating system in her research. Her Artificial intelligence study frequently links to other fields, such as False positive paradox. In her research, Wenke Lee undertakes multidisciplinary study on False positive paradox and False positives and false negatives.
Wenke Lee is involved in relevant fields of research such as Overhead (engineering) and Process (computing) in the domain of Operating system. In her works, she undertakes multidisciplinary study on Computer security and Computer network. Her study deals with a combination of Computer network and Network packet. As part of her studies on Network packet, Wenke Lee often connects relevant areas like Computer security. Her Intrusion detection system study frequently links to other fields, such as Artificial intelligence. Her Artificial intelligence study typically links adjacent topics like Intrusion detection system. She merges Data mining with Machine learning in her research. She merges Machine learning with Data mining in her study. Her study connects Botnet and World Wide Web.
Her work on Geometry is being expanded to include thematically relevant topics such as Flow (mathematics) and Point (geometry). Her Flow (mathematics) study frequently draws parallels with other fields, such as Geometry. Wenke Lee combines topics linked to Random access memory with her work on Computer hardware. Random access memory is often connected to Computer hardware in her work. Operating system and Malware are two areas of study in which she engages in interdisciplinary work. Wenke Lee integrates several fields in her works, including Computer security and Misinformation. Her study deals with a combination of Misinformation and Computer security. Wenke Lee undertakes interdisciplinary study in the fields of Programming language and Control flow through her research. Wenke Lee combines Control flow and Programming language in her studies.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Data mining approaches for intrusion detection
Wenke Lee;Salvatore J. Stolfo.
usenix security symposium (1998)
A data mining framework for building intrusion detection models
Wenke Lee;S.J. Stolfo;K.W. Mok.
ieee symposium on security and privacy (1999)
Intrusion detection in wireless ad-hoc networks
Yongguang Zhang;Wenke Lee.
acm/ieee international conference on mobile computing and networking (2000)
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
Guofei Gu;Roberto Perdisci;Junjie Zhang;Wenke Lee.
usenix security symposium (2008)
A framework for constructing features and models for intrusion detection systems
Wenke Lee;Salvatore J. Stolfo.
ACM Transactions on Information and System Security (2000)
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
Guofei Gu;Junjie Zhang;Wenke Lee.
network and distributed system security symposium (2008)
BotHunter: detecting malware infection through IDS-driven dialog correlation
Guofei Gu;Phillip Porras;Vinod Yegneswaran;Martin Fong.
usenix security symposium (2007)
Intrusion detection techniques for mobile wireless networks
Yongguang Zhang;Wenke Lee;Yi-An Huang.
Wireless Networks (2003)
Ether: malware analysis via hardware virtualization extensions
Artem Dinaburg;Paul Royal;Monirul Sharif;Wenke Lee.
computer and communications security (2008)
Information-theoretic measures for anomaly detection
Wenke Lee;Dong Xiang.
ieee symposium on security and privacy (2001)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: