2017 - ACM Fellow For contributions to systems and network security, intrusion and anomaly detection and malware analysis
Wenke Lee focuses on Intrusion detection system, Data mining, Computer security, Anomaly detection and Anomaly-based intrusion detection system. His studies deal with areas such as Wireless ad hoc network, Machine learning and Computer network as well as Intrusion detection system. The various areas that he examines in his Data mining study include Pattern matching, Software deployment, Cluster analysis and Audit.
Particularly relevant to Malware is his body of work in Computer security. The concepts of his Anomaly detection study are interwoven with issues in Data security, Conditional entropy and Intrusion prevention system. His studies in Anomaly-based intrusion detection system integrate themes in fields like Exploit and Construct.
The scientist’s investigation covers issues in Computer security, Intrusion detection system, Data mining, Malware and Computer network. His biological study spans a wide range of topics, including Botnet, The Internet, World Wide Web and Server. His study in Intrusion detection system is interdisciplinary in nature, drawing from both Anomaly detection, Real-time computing and Host.
He has researched Data mining in several fields, including Machine learning, Cluster analysis, Set and Audit. His Malware study incorporates themes from Virtualization and Executable. Computer network and Wireless ad hoc network are commonly linked in his work.
Wenke Lee spends much of his time researching Computer security, Information flow, Overhead, Distributed computing and Stochastic game. His Computer security research incorporates themes from Metadata and Internet privacy. His Information flow study also includes fields such as
His Overhead research is multidisciplinary, relying on both Data flow diagram, Process, Theoretical computer science and Memory corruption. His Distributed computing research includes themes of Resource, Host and Network packet. His work investigates the relationship between Malware and topics such as Pipeline that intersect with problems in Program analysis.
His primary scientific interests are in Computer security, Scalability, Internet privacy, Overhead and Process. His research on Computer security frequently links to adjacent areas such as Workflow. His Scalability study integrates concerns from other disciplines, such as Computer engineering, Software license, Source lines of code, Java and Data compaction.
Wenke Lee combines subjects such as Clickjacking, Permission system and Login with his study of Internet privacy. His research in Overhead intersects with topics in Real-time computing, Pre-play attack and Filter. The Exploit study combines topics in areas such as Implementation, Server and Control-flow integrity, Code.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Data mining approaches for intrusion detection
Wenke Lee;Salvatore J. Stolfo.
usenix security symposium (1998)
A data mining framework for building intrusion detection models
Wenke Lee;S.J. Stolfo;K.W. Mok.
ieee symposium on security and privacy (1999)
Intrusion detection in wireless ad-hoc networks
Yongguang Zhang;Wenke Lee.
acm/ieee international conference on mobile computing and networking (2000)
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
Guofei Gu;Roberto Perdisci;Junjie Zhang;Wenke Lee.
usenix security symposium (2008)
A framework for constructing features and models for intrusion detection systems
Wenke Lee;Salvatore J. Stolfo.
ACM Transactions on Information and System Security (2000)
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
Guofei Gu;Junjie Zhang;Wenke Lee.
network and distributed system security symposium (2008)
BotHunter: detecting malware infection through IDS-driven dialog correlation
Guofei Gu;Phillip Porras;Vinod Yegneswaran;Martin Fong.
usenix security symposium (2007)
Intrusion detection techniques for mobile wireless networks
Yongguang Zhang;Wenke Lee;Yi-An Huang.
Wireless Networks (2003)
Ether: malware analysis via hardware virtualization extensions
Artem Dinaburg;Paul Royal;Monirul Sharif;Wenke Lee.
computer and communications security (2008)
Information-theoretic measures for anomaly detection
Wenke Lee;Dong Xiang.
ieee symposium on security and privacy (2001)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: