Information Security Group

Publications

  • Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: Misleading Worm Signature Generators Using De liberate Noise Injection. S&P: 17-31
  • Polymorphic Blending Attacks. Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, and Wenke Lee. In Proceed ings of The 15th USENIX Security Symposium, Vancouver, B.C., Canada.
  • Anomaly Detection Using Call Stack Information. Henry H. Feng, Oleg Kolesnikov, Prahlad Fogla, Wenke Lee, and Weibo Gong In Proceedings of The 2003 IEEE Symposium on Security and Privacy, Oakland, CA.
  • An Extensible Environment for Evaluating Secure MANET. Yongguang Zhang, Yi-an Huang and Wenke Lee, in Proceedings of the First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks.
  • Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skoric. In Proceedings of European Symposium on Research in Compu ter Security, Hamburg, Germany.
  • Performance Adaptation in Real-Time Intrusion Detection Systems. Wenke Lee, Joao B. D. Cabrera, Ashley Thomas, Niranjan B alwalli, Sunmeet Saluja, and Yi Zhang In Proceedings of The 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland.
  • Hotspot-Based Traceback for Mobile Ad Hoc Networks. Yi-an Huang and Wenke Lee, in Proceedings of the ACM Workshop on Wire less Security (WiSe'05).
See also Georgia Tech Information Security Center (GTISC) and OIT Information Security.