1. Dynamic Trust Management Blaze, Matt; Kannan, Sampath; Lee, Insup; Sokolsky, Oleg; Smith, Jonathan M.; Keromytis, Angelos D.; Lee, Wenke 2009 Articles Computer science
2. Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eskin, Eleazar; Lee, Wenke; Stolfo, Salvatore 2001 Articles Computer science
3. Real Time Data Mining-based Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K.; Eskin, Eleazar; Fan, Wei; Miller, Matthew; Hershkop, Shlomo; Zhang, Junxin 2001 Articles Computer science
4. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
5. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Stolfo, Salvatore; Fan, Wei; Lee, Wenke; Prodromidis, Andreas L.; Chan, Philip K. 2000 Articles Computer science
6. Toward Cost-Sensitive Modeling for Intrusion Detection Lee, Wenke; Miller, Matthew; Stolfo, Salvatore; Jallad, Kahil; Park, Christopher T.; Zadok, Erez; Prabhakar, Vijay 2000 Reports Computer science
7. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
8. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
9. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
10. Mining in a Data-flow Environment: Experience in Network Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
11. Data Mining Approaches for Intrusion Detection Lee, Wenke; Stolfo, Salvatore 1998 Articles Computer science
12. Mining Audit Data to Build Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1998 Articles Computer science
13. Learning Patterns from Unix Process Execution Traces for Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K. 1997 Articles Computer scienceMachine learningIntrusion detection systems (Computer security)
14. OzCare: A Workflow Automation System for Care Plans Lee, Wenke; Kaiser, Gail E.; Clayton, Paul D.; Sherman, Eric H. 1996 Reports Computer science