Christopher P. Lee

Affiliations:
  • Georgia Institute of Technology, Atlanta, GA, USA


According to our database1, Christopher P. Lee authored at least 18 papers between 2005 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Large-Scale Empirical Study of Conficker.
IEEE Trans. Inf. Forensics Secur., 2012

2011
The Design of NetSecLab: A Small Competition-Based Network Security Lab.
IEEE Trans. Educ., 2011

Goodput Enhancement of VANETs in Noisy CSMA/CA Channels.
IEEE J. Sel. Areas Commun., 2011

2010
Forensic implications of Ext4.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Recursive DNS Architectures and Vulnerability Implications.
Proceedings of the Network and Distributed System Security Symposium, 2009

Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
A Taxonomy of Botnet Structures.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Designing Secure Protocols for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2008

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
Proceedings of the Network and Distributed System Security Symposium, 2008

2007
MobCast: Overlay Architecture for Seamless IP Mobility using Scalable Anycast Proxies.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Dynamic Optimal Fragmentation for Goodput Enhancement in WLANs.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Dynamic Optimal Fragmentation with Rate Adaptation for Goodput Enhancement in WLANs.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

Goodput optimization in CSMA/CA wireless networks.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

A Taxonomy of Botnet Structures.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications, 2006

Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

2005
Visual Firewall: Real-time Network Security Monito.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

IDS RainStorm: Visualizing IDS Alarms.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005


  Loading...