G. Vishwakarma, W. Lee, “Exploiting JTAG and Its Mitigation in IoT: A Survey”, Future Internet, doi:10.3390/fi10120121. 2018
W. Lee, S. Kumar, “Software-Defined Storage-Based Data Infrastructure Supportive of Hydroclimatology Simulation Containers: A Survey” Data Science and Engineering, doi: 10.1007/s41019-016-0008-y. 2016
W. Lee, A. C. Squicciarini, E. Bertino, “Agent-based Accountable Grid Computing Systems” Journal of Supercomputing, doi: 10.1007/s11227-013-0871-5. 2013
S. Kumar, V. Merwade, W. Lee, L. Zhao, C. X. Song “Hydro-climatological Impact of Century Long Drainage in Midwestern United States: CCSM Sensitivity Experiments” Journal of GeophysicalResearch (Atmospheres), 115, D14105, doi: 10.1029/2009JD13228. 2010
[Refereed conference proceedings]
A. R. H. Coronado, W. Lee, “Are We Referring to the Same x86_64?: Detection of Cache Events on AMD’s Zen Micro-architecture”, Proceedings of the 39th International Conference on Distributed Computing Systems Workshop (ICDCS-19), Dallas, TX. Jul. 2019
B. Yang, W. Lee, “Human Body Odor Based Authentication Using Machine Learning”, Proceedings of the IEEE Symposium Series on Computational Intelligence(SSCI-18), Bengaluru, India Nov. 2018
R. A. Ameedee, W. Lee, “Exploiting User Privacy in IoT Devices Using Deep Learning and its Mitigation”, Proceedings of the 12th International Conference on Emerging Security Information, Systems and Technologies(SECURWARE-18), Venice, Italy Sep. 2018 [Best Paper Award]
A. M. Honap, W. Lee, “Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming”, Proceedings of the 13th International Conference on Information Systems Security(ICISS-17), Bombay, India Dec. 2017
V. V. Sarkale, P. Rad, W. Lee, “Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC)”, Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud-17), New York City, NY Jun 2017
W. Lee, A. C. Squicciarini, E. Bertino, “Profile-based Selection of Accountability Policies in Grid Computing Systems”, Proceedings of the 12th IEEE International Symposium on Policies forDistributed Systems and Networks(POLICY-11), Pisa, Italy Jun 2011
W. Lee, A. C. Squicciarini, E. Bertino, “Detection & Protection from DDoS Attacks in Accountable Grid Computing Systems”, Proceedings of the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid-11), Newport Beach, CA. May 2011
L. Zhao, W. Lee, C. Song, M. Huber, A. Goldner, “Bringing High Performance Climate Modeling into the Classroom”, Proceedings of the 5th Teragrid 10 conference (TeraGrid-10), Pittsburgh, PA. Aug. 2010
W. Lee, A. C. Squicciarini, E. Bertino, “The Design and Evaluation of Accountable Grid Computing Systems”, Proceedings of the 29th International Conference on Distributed Computing Systems (ICDCS-09), Montreal Quebec, Canada, Jun. 2009
A. C. Squicciarini, W. Lee, E. Bertino, C. X. Song, “A Policy-based Accountability Tool for Grid Computing Systems”, Proceedings of IEEE Asia Pacific Service Computing Conference (APSCC-08), Yilan, Taiwan, Dec. 2008
W. Lee, A. C. Squicciarini, E. Bertino, “Vulnerabilities Leading to Denial of Services Attacks in Grid Computing Systems: a Survey”, Proceedings of the 6th annual workshop on Cyber security and information intelligence research (CSIIRW-10), Oak Ridge, TN. Apr. 2010
W. Lee, A. C. Squicciarini, E. Bertino, “An Assessment of Accountability Policies for Large-Scale Distributed Computing Systems”, Proceedings of the 5th annual workshop on Cyber Security and Information Intelligence Research (CSIIRW-09), Oak Ridge, TN. May 2009
E. Bertino, W. Lee, A. C. Squicciarini, B. Thuraisingham, “End-to-End Accountability in Grid Computing Systems for Coalition Information Sharing”, Proceedings of the 4th annual workshop on Cyber Securityand Information Intelligence Research (CSIIRW-08), Oak Ridge, TN. May 2008
L. Zhao, T. Park, R. Kalyanam, W. Lee, S. Goasguen “Purdue Multidisciplinary Data Management Framework Using SRB” Proceedings of SRB Workshop, San Diego, CA, Feb. 2006
[Patent]
Yoon, Y. Chung, M. Lee, W. Lee, N. S. Alexander, “Apparatus and Method for Detecting Container Rootkit”, US, 15/922,747, South Korea, 10-2018-0102796 Feb. 2018
W. Lee, M. Lee, C. Jeong, “Method and apparatus for security checking of image for containers”, United States, Publication number: US20170054759 A1, CN106469083A, WO2017030252A1 Feb. 2017
W. Lee, “System and Methods for Detecting Software Tampering”, South Korea, 10-2015-0075827 May 2015
W. Lee, “A method to decide alarm severity between managing elements and high level managing groups in TMN”, South Korea, 10-1999-0054740 Jul. 1999