Publications
- Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I.
Sharif: Misleading Worm Signature Generators Using De
liberate Noise Injection. S&P: 17-31
- Polymorphic Blending Attacks. Prahlad Fogla, Monirul Sharif, Roberto
Perdisci, Oleg Kolesnikov, and Wenke Lee. In Proceed
ings of The 15th USENIX Security Symposium, Vancouver, B.C., Canada.
- Anomaly Detection Using Call Stack Information. Henry H. Feng, Oleg
Kolesnikov, Prahlad Fogla, Wenke Lee, and Weibo Gong
In Proceedings of The 2003 IEEE Symposium on Security and Privacy, Oakland,
CA.
- An Extensible Environment for Evaluating Secure MANET. Yongguang Zhang,
Yi-an Huang and Wenke Lee, in Proceedings of the
First IEEE/CreateNet International Conference on Security and Privacy for
Emerging Areas in Communication Networks.
- Towards an Information-Theoretic Framework for Analyzing Intrusion
Detection Systems.
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skoric. In
Proceedings of European Symposium on Research in Compu
ter Security, Hamburg, Germany.
- Performance Adaptation in Real-Time Intrusion Detection Systems. Wenke
Lee, Joao B. D. Cabrera, Ashley Thomas, Niranjan B
alwalli, Sunmeet Saluja, and Yi Zhang
In Proceedings of The 5th International Symposium on Recent Advances in
Intrusion Detection (RAID 2002), Zurich, Switzerland.
- Hotspot-Based Traceback for Mobile Ad Hoc Networks. Yi-an Huang and Wenke
Lee, in Proceedings of the ACM Workshop on Wire
less Security (WiSe'05).
|
See also Georgia Tech Information Security Center (GTISC) and OIT Information Security.
|