D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 93 Citations 41,431 241 World Ranking 217 National Ranking 131

Research.com Recognitions

Awards & Achievements

2017 - ACM Fellow For contributions to systems and network security, intrusion and anomaly detection and malware analysis

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

Wenke Lee focuses on Intrusion detection system, Data mining, Computer security, Anomaly detection and Anomaly-based intrusion detection system. His studies deal with areas such as Wireless ad hoc network, Machine learning and Computer network as well as Intrusion detection system. The various areas that he examines in his Data mining study include Pattern matching, Software deployment, Cluster analysis and Audit.

Particularly relevant to Malware is his body of work in Computer security. The concepts of his Anomaly detection study are interwoven with issues in Data security, Conditional entropy and Intrusion prevention system. His studies in Anomaly-based intrusion detection system integrate themes in fields like Exploit and Construct.

His most cited work include:

  • Data mining approaches for intrusion detection (1119 citations)
  • A data mining framework for building intrusion detection models (1101 citations)
  • Intrusion detection in wireless ad-hoc networks (1074 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Intrusion detection system, Data mining, Malware and Computer network. His biological study spans a wide range of topics, including Botnet, The Internet, World Wide Web and Server. His study in Intrusion detection system is interdisciplinary in nature, drawing from both Anomaly detection, Real-time computing and Host.

He has researched Data mining in several fields, including Machine learning, Cluster analysis, Set and Audit. His Malware study incorporates themes from Virtualization and Executable. Computer network and Wireless ad hoc network are commonly linked in his work.

He most often published in these fields:

  • Computer security (38.73%)
  • Intrusion detection system (28.52%)
  • Data mining (19.37%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (38.73%)
  • Information flow (5.28%)
  • Overhead (5.63%)

In recent papers he was focusing on the following fields of study:

Wenke Lee spends much of his time researching Computer security, Information flow, Overhead, Distributed computing and Stochastic game. His Computer security research incorporates themes from Metadata and Internet privacy. His Information flow study also includes fields such as

  • Nash equilibrium which intersects with area such as Security policy,
  • Enhanced Data Rates for GSM Evolution which connect with State, Approximation algorithm and Submodular set function.

His Overhead research is multidisciplinary, relying on both Data flow diagram, Process, Theoretical computer science and Memory corruption. His Distributed computing research includes themes of Resource, Host and Network packet. His work investigates the relationship between Malware and topics such as Pipeline that intersect with problems in Program analysis.

Between 2015 and 2021, his most popular works were:

  • Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop (64 citations)
  • Enforcing Kernel Security Invariants with Data Flow Integrity. (57 citations)
  • How to Make ASLR Win the Clone Wars: Runtime Re‐Randomization (52 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

His primary scientific interests are in Computer security, Scalability, Internet privacy, Overhead and Process. His research on Computer security frequently links to adjacent areas such as Workflow. His Scalability study integrates concerns from other disciplines, such as Computer engineering, Software license, Source lines of code, Java and Data compaction.

Wenke Lee combines subjects such as Clickjacking, Permission system and Login with his study of Internet privacy. His research in Overhead intersects with topics in Real-time computing, Pre-play attack and Filter. The Exploit study combines topics in areas such as Implementation, Server and Control-flow integrity, Code.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Data mining approaches for intrusion detection

Wenke Lee;Salvatore J. Stolfo.
usenix security symposium (1998)

1974 Citations

A data mining framework for building intrusion detection models

Wenke Lee;S.J. Stolfo;K.W. Mok.
ieee symposium on security and privacy (1999)

1886 Citations

Intrusion detection in wireless ad-hoc networks

Yongguang Zhang;Wenke Lee.
acm/ieee international conference on mobile computing and networking (2000)

1724 Citations

BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection

Guofei Gu;Roberto Perdisci;Junjie Zhang;Wenke Lee.
usenix security symposium (2008)

1383 Citations

A framework for constructing features and models for intrusion detection systems

Wenke Lee;Salvatore J. Stolfo.
ACM Transactions on Information and System Security (2000)

1163 Citations

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic

Guofei Gu;Junjie Zhang;Wenke Lee.
network and distributed system security symposium (2008)

1067 Citations

BotHunter: detecting malware infection through IDS-driven dialog correlation

Guofei Gu;Phillip Porras;Vinod Yegneswaran;Martin Fong.
usenix security symposium (2007)

1042 Citations

Intrusion detection techniques for mobile wireless networks

Yongguang Zhang;Wenke Lee;Yi-An Huang.
Wireless Networks (2003)

1030 Citations

Ether: malware analysis via hardware virtualization extensions

Artem Dinaburg;Paul Royal;Monirul Sharif;Wenke Lee.
computer and communications security (2008)

876 Citations

Information-theoretic measures for anomaly detection

Wenke Lee;Dong Xiang.
ieee symposium on security and privacy (2001)

801 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Wenke Lee

Salvatore J. Stolfo

Salvatore J. Stolfo

Columbia University

Publications: 88

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 76

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 70

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 62

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 61

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 48

Konrad Rieck

Konrad Rieck

Technische Universität Braunschweig

Publications: 46

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 45

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 42

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 42

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 42

Xiangyu Zhang

Xiangyu Zhang

Purdue University West Lafayette

Publications: 41

Guofei Gu

Guofei Gu

Texas A&M University

Publications: 41

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 41

Ali A. Ghorbani

Ali A. Ghorbani

University of New Brunswick

Publications: 41

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 41

Trending Scientists

Lori A. Clarke

Lori A. Clarke

University of Massachusetts Amherst

Jean-Pierre E. Grolier

Jean-Pierre E. Grolier

Centre national de la recherche scientifique, CNRS

Xinyuan Zhu

Xinyuan Zhu

Shanghai Jiao Tong University

Zhi-Tang Huang

Zhi-Tang Huang

Chinese Academy of Sciences

Shanyi Du

Shanyi Du

Harbin Institute of Technology

Bernard Beaumont

Bernard Beaumont

Centre national de la recherche scientifique, CNRS

Ivan Damjanov

Ivan Damjanov

University of Kansas

Sophie Bonnet

Sophie Bonnet

Mediterranean Institute of Oceanography

Philip J. Ward

Philip J. Ward

Vrije Universiteit Amsterdam

Andrew E. Budson

Andrew E. Budson

Boston University

Suzanne C. Segerstrom

Suzanne C. Segerstrom

University of Kentucky

Tsutomu Chiba

Tsutomu Chiba

Kyoto University

Mark A. Perazella

Mark A. Perazella

Yale University

Michael J. Shanahan

Michael J. Shanahan

Cornell University

John M. Benson

John M. Benson

Harvard University

M. S. Skolnick

M. S. Skolnick

University of Sheffield

Something went wrong. Please try again later.