Zhuowei Li

Affiliations:
  • Microsoft Corporation, Seattle, WA, USA
  • Indiana University at Bloomington, School of Informatics, IN, USA (2005 - 2008)
  • Nanyang Technological University, School of Computer Engineering, Singapore (PhD 2005)


According to our database1, Zhuowei Li authored at least 21 papers between 2003 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2012
Intelligent ubiquitous IT policy and its industrial services.
J. Intell. Manuf., 2012

2008
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur., 2008

Variable-length signatures for intrusion detection.
Comput. Syst. Sci. Eng., 2008

Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software .
Proceedings of the 17th USENIX Security Symposium, 2008

PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
Proceedings of the Network and Distributed System Security Symposium, 2008

AGIS: Towards automatic generation of infection signatures.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Towards automatic reverse engineering of software security configurations.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Framework for systematic design, analysis and evaluation of intrusion detection systems
PhD thesis, 2007

Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.
Proceedings of the Trust, 2007

Evaluating the Effects of Model Generalization on Intrusion Detection Performance.
Proceedings of the New Approaches for Security, 2007

SpyShield: Preserving Privacy from Spy Add-Ons.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

2006
Analyzing and evaluating dynamics in stide performance for intrusion detection.
Knowl. Based Syst., 2006

Packet vaccine: black-box exploit detection and signature generation.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection.
Int. J. Netw. Secur., 2005

USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Model Redundancy vs. Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2005

M of N Features vs. Intrusion Detection.
Proceedings of the Computational Science and Its Applications, 2005

Model Generalization and Its Implications on Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors
CoRR, 2004

Visualizing and Identifying Intrusion Context from System Calls Trace.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Utilizing Statistical Characteristics of N-grams for Intrusion Detection.
Proceedings of the 2nd International Conference on Cyberworlds (CW 2003), 2003


  Loading...