D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 94 Citations 41,695 282 World Ranking 290 National Ranking 175

Research.com Recognitions

Awards & Achievements

2017 - ACM Fellow For contributions to systems and network security, intrusion and anomaly detection and malware analysis

Overview

What is she best known for?

The fields of study Wenke Lee is best known for:

  • Computer network
  • False positives and false negatives
  • Operating system

Her Linguistics study typically links adjacent topics like TRACE (psycholinguistics) and Feature (linguistics). Her Feature (linguistics) study frequently links to other fields, such as Linguistics. She integrates Intrusion detection system with Honeypot in her research. She undertakes interdisciplinary study in the fields of Honeypot and Intrusion detection system through her works. Her work blends Computer security and Attack patterns studies together. While working on this project, Wenke Lee studies both Operating system and Embedded system. She combines Embedded system and Operating system in her research. Her Artificial intelligence study frequently links to other fields, such as False positive paradox. In her research, Wenke Lee undertakes multidisciplinary study on False positive paradox and False positives and false negatives.

Her most cited work include:

  • A framework for constructing features and models for intrusion detection systems (823 citations)
  • None (631 citations)
  • Lares: An Architecture for Secure Active Monitoring Using Virtualization (356 citations)

What are the main themes of her work throughout her whole career to date

Wenke Lee is involved in relevant fields of research such as Overhead (engineering) and Process (computing) in the domain of Operating system. In her works, she undertakes multidisciplinary study on Computer security and Computer network. Her study deals with a combination of Computer network and Network packet. As part of her studies on Network packet, Wenke Lee often connects relevant areas like Computer security. Her Intrusion detection system study frequently links to other fields, such as Artificial intelligence. Her Artificial intelligence study typically links adjacent topics like Intrusion detection system. She merges Data mining with Machine learning in her research. She merges Machine learning with Data mining in her study. Her study connects Botnet and World Wide Web.

Wenke Lee most often published in these fields:

  • Computer security (57.78%)
  • Intrusion detection system (40.00%)
  • Operating system (37.78%)

What were the highlights of her more recent work (between 2018-2021)?

  • Computer hardware (50.00%)
  • Operating system (50.00%)
  • Computer security (50.00%)

In recent works Wenke Lee was focusing on the following fields of study:

Her work on Geometry is being expanded to include thematically relevant topics such as Flow (mathematics) and Point (geometry). Her Flow (mathematics) study frequently draws parallels with other fields, such as Geometry. Wenke Lee combines topics linked to Random access memory with her work on Computer hardware. Random access memory is often connected to Computer hardware in her work. Operating system and Malware are two areas of study in which she engages in interdisciplinary work. Wenke Lee integrates several fields in her works, including Computer security and Misinformation. Her study deals with a combination of Misinformation and Computer security. Wenke Lee undertakes interdisciplinary study in the fields of Programming language and Control flow through her research. Wenke Lee combines Control flow and Programming language in her studies.

Between 2018 and 2021, her most popular works were:

  • The Creation and Detection of Deepfakes (140 citations)
  • Stopping Memory Disclosures via Diversification and Replicated Execution (14 citations)
  • A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats (13 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Data mining approaches for intrusion detection

Wenke Lee;Salvatore J. Stolfo.
usenix security symposium (1998)

2104 Citations

A data mining framework for building intrusion detection models

Wenke Lee;S.J. Stolfo;K.W. Mok.
ieee symposium on security and privacy (1999)

1976 Citations

Intrusion detection in wireless ad-hoc networks

Yongguang Zhang;Wenke Lee.
acm/ieee international conference on mobile computing and networking (2000)

1795 Citations

BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection

Guofei Gu;Roberto Perdisci;Junjie Zhang;Wenke Lee.
usenix security symposium (2008)

1544 Citations

A framework for constructing features and models for intrusion detection systems

Wenke Lee;Salvatore J. Stolfo.
ACM Transactions on Information and System Security (2000)

1253 Citations

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic

Guofei Gu;Junjie Zhang;Wenke Lee.
network and distributed system security symposium (2008)

1192 Citations

BotHunter: detecting malware infection through IDS-driven dialog correlation

Guofei Gu;Phillip Porras;Vinod Yegneswaran;Martin Fong.
usenix security symposium (2007)

1151 Citations

Intrusion detection techniques for mobile wireless networks

Yongguang Zhang;Wenke Lee;Yi-An Huang.
Wireless Networks (2003)

1082 Citations

Ether: malware analysis via hardware virtualization extensions

Artem Dinaburg;Paul Royal;Monirul Sharif;Wenke Lee.
computer and communications security (2008)

1001 Citations

Information-theoretic measures for anomaly detection

Wenke Lee;Dong Xiang.
ieee symposium on security and privacy (2001)

888 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Wenke Lee

Salvatore J. Stolfo

Salvatore J. Stolfo

Columbia University

Publications: 88

Peng Liu

Peng Liu

Pennsylvania State University

Publications: 76

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 70

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 62

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 61

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 48

Konrad Rieck

Konrad Rieck

Technische Universität Braunschweig

Publications: 46

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 45

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 42

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 42

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 42

Guofei Gu

Guofei Gu

Texas A&M University

Publications: 41

Xiangyu Zhang

Xiangyu Zhang

Purdue University West Lafayette

Publications: 41

Ali A. Ghorbani

Ali A. Ghorbani

University of New Brunswick

Publications: 41

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 41

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 41

Trending Scientists

Lori A. Clarke

Lori A. Clarke

University of Massachusetts Amherst

Jean-Pierre E. Grolier

Jean-Pierre E. Grolier

Centre national de la recherche scientifique, CNRS

Xinyuan Zhu

Xinyuan Zhu

Shanghai Jiao Tong University

Zhi-Tang Huang

Zhi-Tang Huang

Chinese Academy of Sciences

Shanyi Du

Shanyi Du

Harbin Institute of Technology

Bernard Beaumont

Bernard Beaumont

Centre national de la recherche scientifique, CNRS

Ivan Damjanov

Ivan Damjanov

University of Kansas

Sophie Bonnet

Sophie Bonnet

Mediterranean Institute of Oceanography

Philip J. Ward

Philip J. Ward

Vrije Universiteit Amsterdam

Andrew E. Budson

Andrew E. Budson

Boston University

Suzanne C. Segerstrom

Suzanne C. Segerstrom

University of Kentucky

Tsutomu Chiba

Tsutomu Chiba

Kyoto University

Mark A. Perazella

Mark A. Perazella

Yale University

Michael J. Shanahan

Michael J. Shanahan

Cornell University

John M. Benson

John M. Benson

Harvard University

M. S. Skolnick

M. S. Skolnick

University of Sheffield

Something went wrong. Please try again later.