Publications

[Peer reviewed journals]

  • G. Vishwakarma, W. Lee, “Exploiting JTAG and Its Mitigation in IoT: A Survey”, Future Internet, doi:10.3390/fi10120121. 2018
  • W. Lee, S. Kumar, “Software-Defined Storage-Based Data Infrastructure Supportive of Hydroclimatology Simulation Containers: A Survey” Data Science and Engineering, doi: 10.1007/s41019-016-0008-y. 2016
  • W. Lee, A. C. Squicciarini, E. Bertino, “Agent-based Accountable Grid Computing Systems” Journal of Supercomputing, doi: 10.1007/s11227-013-0871-5. 2013
  • S. Kumar, V. Merwade, W. Lee, L. Zhao, C. X. Song “Hydro-climatological Impact of Century Long Drainage in Midwestern United States: CCSM Sensitivity Experiments” Journal of Geophysical Research (Atmospheres), 115, D14105, doi: 10.1029/2009JD13228. 2010

[Refereed conference proceedings]

  • A. R. H. Coronado, W. Lee, “Are We Referring to the Same x86_64?: Detection of Cache Events on AMD’s Zen Micro-architecture”, Proceedings of the 39th International Conference on Distributed Computing Systems Workshop (ICDCS-19), Dallas, TX. Jul. 2019
  • B. Yang, W. Lee, “Human Body Odor Based Authentication Using Machine Learning”, Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI-18), Bengaluru, India Nov. 2018
  • R. A. Ameedee, W. Lee, “Exploiting User Privacy in IoT Devices Using Deep Learning and its Mitigation”, Proceedings of the 12th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE-18), Venice, Italy Sep. 2018 [Best Paper Award]
  • A. M. Honap, W. Lee, “Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming”, Proceedings of the 13th International Conference on Information Systems Security (ICISS-17), Bombay, India Dec. 2017
  • V. V. Sarkale, P. Rad, W. Lee, “Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC)”, Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud-17), New York City, NY Jun 2017
  • W. Lee, A. C. Squicciarini, E. Bertino, “Profile-based Selection of Accountability Policies in Grid Computing Systems”, Proceedings of the 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY-11), Pisa, Italy Jun 2011
  • W. Lee, A. C. Squicciarini, E. Bertino, “Detection & Protection from DDoS Attacks in Accountable Grid Computing Systems”, Proceedings of the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid-11), Newport Beach, CA. May 2011
  • L. Zhao, W. Lee, C. Song, M. Huber, A. Goldner, “Bringing High Performance Climate Modeling into the Classroom”, Proceedings of the 5th Teragrid 10 conference (TeraGrid-10), Pittsburgh, PA. Aug. 2010
  • W. Lee, A. C. Squicciarini, E. Bertino, “The Design and Evaluation of Accountable Grid Computing Systems”, Proceedings of the 29th International Conference on Distributed Computing Systems (ICDCS-09), Montreal Quebec, Canada, Jun. 2009
  • A. C. Squicciarini, W. Lee, E. Bertino, C. X. Song, “A Policy-based Accountability Tool for Grid Computing Systems”, Proceedings of IEEE Asia Pacific Service Computing Conference (APSCC-08), Yilan, Taiwan, Dec. 2008
  • W. Lee, A. C. Squicciarini, E. Bertino, “Vulnerabilities Leading to Denial of Services Attacks in Grid Computing Systems: a Survey”, Proceedings of the 6th annual workshop on Cyber security and information intelligence research (CSIIRW-10), Oak Ridge, TN. Apr. 2010
  • W. Lee, A. C. Squicciarini, E. Bertino, “An Assessment of Accountability Policies for Large-Scale Distributed Computing Systems”, Proceedings of the 5th annual workshop on Cyber Security and Information Intelligence Research (CSIIRW-09), Oak Ridge, TN. May 2009
  • E. Bertino, W. Lee, A. C. Squicciarini, B. Thuraisingham, “End-to-End Accountability in Grid Computing Systems for Coalition Information Sharing”, Proceedings of the 4th annual workshop on Cyber Security and Information Intelligence Research (CSIIRW-08), Oak Ridge, TN. May 2008
  • L. Zhao, T. Park, R. Kalyanam, W. Lee, S. Goasguen “Purdue Multidisciplinary Data Management Framework Using SRB” Proceedings of SRB Workshop, San Diego, CA, Feb. 2006

[Patent]

  • Yoon, Y. Chung, M. Lee, W. Lee, N. S. Alexander, “Apparatus and Method for Detecting Container Rootkit”, US, 15/922,747South Korea, 10-2018-0102796 Feb. 2018
  • W. Lee, M. Lee, C. Jeong, “Method and apparatus for security checking of image for containers”, United States, Publication number: US20170054759 A1CN106469083A, WO2017030252A1 Feb. 2017
  • W. Lee, “System and Methods for Detecting Software Tampering”, South Korea10-2015-0075827 May 2015
  • W. Lee, “A method to decide alarm severity between managing elements and high level managing groups in TMN”, South Korea, 10-1999-0054740 Jul. 1999