Year |
Citation |
Score |
2020 |
Moothedath S, Sahabandu D, Allen J, Clark A, Bushnell L, Lee W, Poovendran R. A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats Ieee Transactions On Automatic Control. 1-1. DOI: 10.1109/Tac.2020.2976040 |
0.305 |
|
2016 |
Riegler J, Ebert A, Qin X, Shen Q, Wang M, Ameen M, Kodo K, Ong SG, Lee WH, Lee G, Neofytou E, Gold JD, Connolly AJ, Wu JC. Comparison of Magnetic Resonance Imaging and Serum Biomarkers for Detection of Human Pluripotent Stem Cell-Derived Teratomas. Stem Cell Reports. PMID 26777057 DOI: 10.1016/J.Stemcr.2015.12.008 |
0.412 |
|
2015 |
Zhu Z, Tang NL, Xu L, Qin X, Mao S, Song Y, Liu L, Li F, Liu P, Yi L, Chang J, Jiang L, Ng BK, Shi B, Zhang W, ... ... Lee WY, et al. Genome-wide association study identifies new susceptibility loci for adolescent idiopathic scoliosis in Chinese girls. Nature Communications. 6: 8355. PMID 26394188 DOI: 10.1038/ncomms9355 |
0.405 |
|
2014 |
Först M, Tobey RI, Bromberger H, Wilkins SB, Khanna V, Caviglia AD, Chuang YD, Lee WS, Schlotter WF, Turner JJ, Minitti MP, Krupin O, Xu ZJ, Wen JS, Gu GD, et al. Melting of charge stripes in vibrationally driven La(1.875)Ba(0.125)CuO4: assessing the respective roles of electronic and lattice order in frustrated superconductors. Physical Review Letters. 112: 157002. PMID 24785066 DOI: 10.1103/Physrevlett.112.157002 |
0.358 |
|
2014 |
Zhang J, Perdisci R, Lee W, Luo X, Sarfraz U. Building a Scalable System for Stealthy P2P-Botnet Detection Ieee Transactions On Information Forensics and Security. 9: 27-38. DOI: 10.1109/Tifs.2013.2290197 |
0.39 |
|
2009 |
Perdisci R, Ariu D, Fogla P, Giacinto G, Lee W. McPAD: A multiple classifier system for accurate payload-based anomaly detection Computer Networks. 53: 864-881. DOI: 10.1016/J.Comnet.2008.11.011 |
0.675 |
|
2008 |
Medard M, Fragouli C, Lee W, Maxion RA, Stolfo S, Tong L. Guest editorial special section on statistical methods for network security and forensics Ieee Transactions On Information Forensics and Security. 3: 345-346. DOI: 10.1109/Tifs.2008.928950 |
0.56 |
|
2008 |
Perdisci R, Lanzi A, Lee W. Classification of packed executables for accurate computer virus detection Pattern Recognition Letters. 29: 1941-1946. DOI: 10.1016/J.Patrec.2008.06.016 |
0.319 |
|
2007 |
Payne BD, Sailer R, Cáceres R, Perez R, Lee W. A layered approach to simplified access control in virtualized systems Operating Systems Review (Acm). 41: 12-19. DOI: 10.1145/1278901.1278905 |
0.625 |
|
2006 |
Fogla P, Lee W. q-gram matching using tree models Ieee Transactions On Knowledge and Data Engineering. 18: 433-447. DOI: 10.1109/Tkde.2006.66 |
0.662 |
|
2003 |
Zhang Y, Lee W, Huang Y. Intrusion detection techniques for mobile wireless networks Wireless Networks. 9: 545-556. DOI: 10.1023/A:1024600519144 |
0.526 |
|
2002 |
Lee W, Fan W, Miller M, Stolfo SJ, Zadok E. Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. 10: 5-22. DOI: 10.3233/Jcs-2002-101-202 |
0.59 |
|
2002 |
Lee W. Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility Sigkdd Explorations. 4: 35-42. DOI: 10.1145/772862.772868 |
0.393 |
|
2002 |
Cabrera JBD, Lewis L, Qin X, Lee W, Mehra RK. Proactive Intrusion Detection and Distributed Denial of Service Attacks—A Case Study in Security Management Journal of Network and Systems Management. 10: 225-254. DOI: 10.1023/A:1015910917349 |
0.365 |
|
2000 |
Lee W, Stolfo SJ. A framework for constructing features and models for intrusion detection systems Acm Transactions On Information and System Security. 3: 227-261. DOI: 10.1145/382912.382914 |
0.619 |
|
2000 |
Lee W, Stolfo SJ, Mok KW. Adaptive intrusion detection: A data mining approach Artificial Intelligence Review. 14: 533-567. DOI: 10.1023/A:1006624031083 |
0.597 |
|
Show low-probability matches. |