[go: up one dir, main page]

Follow
Tim Leek
Tim Leek
MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
Topic detection and tracking: event-based information organization
J Allan
Springer Science & Business Media, 2002
12392002
A hidden Markov model information retrieval system
DRH Miller, T Leek, RM Schwartz
Proceedings of the 22nd annual international ACM SIGIR conference on …, 1999
7001999
Taint-based directed whitebox fuzzing
V Ganesh, T Leek, M Rinard
2009 IEEE 31st international conference on software engineering, 474-484, 2009
5442009
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
5082016
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
4412011
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
3992004
Speech and language technologies for audio indexing and retrieval
J Makhoul, F Kubala, T Leek, D Liu, L Nguyen, R Schwartz, A Srivastava
Proceedings of the IEEE 88 (8), 1338-1353, 2000
2482000
Information extraction using hidden Markov models
TR Leek
University of California, San Diego, 1997
2361997
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
2252015
Phonetic speaker recognition with support vector machines
W Campbell, J Campbell, D Reynolds, D Jones, T Leek
Advances in neural information processing systems 16, 2003
2092003
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1162013
High-level speaker verification with support vector machines
WM Campbell, JR Campbell, DA Reynolds, DA Jones, TR Leek
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
1142004
Sok: Enabling security analyses of embedded systems via rehosting
A Fasano, T Ballo, M Muench, T Leek, A Bulekov, B Dolan-Gavitt, M Egele, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
1132021
Experiences in cyber security education
J Werther, M Zhivich, T Leek, N Zeldovich
The MIT Lincoln Laboratory Capture-theflag Exercise. In Proceedings of the …, 2011
722011
The fun and future of {CTF}
A Davis, T Leek, M Zhivich, K Gwinnup, W Leonard
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
712014
Probabilistic approaches to topic detection and tracking
T Leek, R Schwartz, S Sista
Topic detection and tracking: event-based information organization, 67-83, 2002
692002
BBN at TREC7: Using hidden Markov models for information retrieval
DRH Miller, T Leek, RM Schwartz
NIST SPECIAL PUBLICATION SP, 133-142, 1999
641999
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis
G Severi, T Leek, B Dolan-Gavitt
International Conference on Detection of Intrusions and Malware, and …, 2018
622018
Experiences in Cyber Security Education: The {MIT} Lincoln Laboratory {Capture-the-Flag} Exercise
J Werther, M Zhivich, T Leek, N Zeldovich
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
562011
Information retrieval system
RM Schwartz, DRH Miller, TR Leek
US Patent 7,162,468, 2007
562007
The system can't perform the operation now. Try again later.
Articles 1–20