Publications (see also repositories at Columbia University and Florida Institute of Technology )

    PAPERS IN REFEREED JOURNALS
  1. A Framework for Constructing Features and Models for Intrusion Detection Systems
    Wenke Lee and Sal Stolfo
    to appear in ACM Transactions on Information and System Security, Volume 3, Number 4 (November 2000)


  2. Adaptive Intrusion Detection: a Data Mining Approach
    Wenke Lee, Sal Stolfo, and Kui Mok
    to appear in Journal Artificial Intelligence Review, Kluwer Academic Publishers, 2000


  3. REFEREED BOOK CHAPTERS
  4. Algorithms for Mining System Audit Data
    (Extended from our KDD' 98 paper)
    Wenke Lee, Sal Stolfo, and Kui Mok
    to appear in Granular Computing and Data Mining , T. Y. Lin (eds), Springer-Verlag, 2000


  5. PAPERS IN REFEREED CONFERENCES
  6. Information-Theoretic Measures for Anomaly Detection
    Wenke Lee and Dong Xiang
    to appear in The 2001 IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.


  7. MEF: Malicious Email Filter - A UNIX Mail Filter that Detects Malicious Windows Executables
    Matthew G. Schultz, Eleazar Eskin, and Salvatore J. Stolfo
    to appear in USENIX Annual Technical Conference - FREENIX Track, Boston, MA, June 2001.


  8. Data Mining Methods for Detection of New Malicious Executables
    Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo
    to appear in The 2001 IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.


  9. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions
    Wenke Lee, Rahul Nimbalkar, Kam Yee, Sunil Patil, Pragnesh Desai, Thuan Tran, and Sal Stolfo
    In Proceedings of The Third International Workshop on Recent Advances in Intrusion Detection (RAID 2000), Lecture Notes in Computer Science No. 1907, Toulouse, France, October 2000


  10. Intrusion Detection in Wireless Ad-Hoc Networks
    Yongguang Zhang and Wenke Lee
    In Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, August 2000


  11. Anomaly Detection over Noisy Data using Learned Probability Distributions
    Eleazar Eskin
    In Proceedings of ICML 2000, July 2000


  12. A Multiple Model Cost-Sensitive Approach for Intrusion Detection
    Wei Fan, Wenke Lee, Sal Stolfo, and Matt Miller
    In Proceedings of The Eleventh European Conference on Machine Learning (ECML 2000), Lecture Notes in Artificial Intelligence No. 1810, Barcelona, Spain, May 2000


  13. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
    Sal Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, and Phil Chan
    In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX '00), Hilton Head, SC, January 2000


  14. Mining in a Data-flow Environment: Experience in Network Intrusion Detection
    (Best Paper Award in Applied Research Category)
    Wenke Lee, Sal Stolfo, and Kui Mok
    In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '99), San Diego, CA, August 1999


  15. A Data Mining Framework for Building Intrusion Detection Models
    Wenke Lee, Sal Stolfo, and Kui Mok
    In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999


  16. Mining Audit Data to Build Intrusion Detection Models
    (Honorable mention (runner-up) for Best Paper Award in Applied Research Category)
    Wenke Lee, Sal Stolfo, and Kui Mok
    In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD '98), New York, NY, August 1998


  17. Data Mining Approaches for Intrusion Detection (PostScript)
    Wenke Lee and Sal Stolfo
    In Proceedings of the Seventh USENIX Security Symposium (SECURITY '98), San Antonio, TX, January 1998


  18. PAPERS IN REFEREED WORKSHOPS
  19. Toward Cost-Sensitive Modeling for Intrusion Detection and Response
    Wenke Lee, Wei Fan, Matt Miller, Sal Stolfo, and Erez Zadok
    in The First ACM Workshop on Intrusion Detection Systems , Athens, Greece, November 2000


  20. Adaptive Model Generation for Intrusion Detection Systems
    Eleazar Eskin, Matthew Miller, Zhi-Da Zhong, George Yi, Wei-Ang Lee, and Sal Stolfo.
    in The First ACM Workshop on Intrusion Detection Systems , Athens, Greece, November 2000