1. Wei Lu. Beginning Robotics Programming in Java with LEGO Mindstorms. Apress Publisher, ISBN: 978-1-4842-2004-7, Nov. 2016.

  2. Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer Publisher, ISBN-10: 0387887709, Oct. 20, 2009.

Books

PUBLICATIONS

  1. Hong Lu, Sara Rosenbaum and Wei Lu. "Precision Dosing Management with Intelligent Computing in Digital Health.” in Lecture Notes on Advances in Intelligent Systems and Computing, vol 1263. Springer Nature, pp. 269-280, August 2020.

  2. Wei Lu, Nathanael Mercaldo, and Chance Tellier. "Characterizing Command and Control Channel of Mongoose Bots Over TOR". in Lecture Notes on Data Engineering and Communication Technologies, Springer Nature, pp. 23-30, June 2020.

  3. Nathanael Mercaldo and Wei Lu. "Classification of Web Applications using AiFlow Features". in Advances in Intelligent Systems and Computing, pp. 389-399, April 2020. 

  4. Wei Lu, John Hancock, Benjamin Osowiecki, Aram Taft and Wei Li. "Leveraging Cloud-based Resources for Automated Biometric Identification". in Biometric-Based Physical and Cybersecurity Systems. Springer Nature, pp. 437-454, Nov. 2018. 

  5. Wei Lu. "Blockchain Technology and Its Applications in FinTech." In Lecture Notes in Computer Science, vol 11317, pp. 118-124. Springer Nature, Nov. 2018.

  6. Wei Lu, Mark Miller and Ling Xue. "Detecting Command and Control Channel of Botnets in Cloud" in Lecture Notes in Computer Science (LNCS, volume 10618). Springer Nature, pp. 55-62, ISBN 978-3-319-69154-1, Oct. 2017.

  7. Wei Lu and Ling Xue. "An Enhanced CUSUM Algorithm for Anomaly Detection" in Information Security Practices. Issa Traore, Ahmed Awad, and Isaac Woungang (Eds.) Springer Nature, pp. 83-96, ISBN 978-3-319-48946-9, Jan. 2017.

  8. David Zhao, Issa Traore, Bassam Sayed, Wei Lu, Sherif Saad, Ali Ghorbani and Dan Garant, "Botnet Detection based on Traffic Behavior Analysis and Flow Intervals", Computer & Security, Elsevier, pp. 2-16, Vol 39, Nov. 2013.

  9. David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. "Peer-to-peer Botnet Detection Based On Flow Intervals" in Information Security and Privacy Research. Dimitris Gritzalis, Steven Furnell and Marianthi Theoharidou (Eds.) Springer Nature, pp. 87-102, ISBN 978-3-642-30436-1.

  10. Wei Lu, Goaletsa Rammidi and Ali A. Ghorbani. "Clustering Botnet Communication Traffic Based on N-gram Feature Selection.", Computer Communications, Vol. 34, No. 3, pp. 502-514, Elsevier, 2011.

  11. Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. Ghorbani. "Automatic Discovery of Network Applications: A Hybrid Approach" in Advances in Artificial Intelligence. Atefeh Farzindar and Keselj, Vlado (Eds.). Springer Nature, pp. 208-219, ISBN 978-3-642-13058-8, 2010.

  12. Wei Lu and Hengjian Tong. "Detecting Network Anomalies Using CUSUM and EM Clustering." in Advances in Computation and Intelligence. Zhenhua Li (Ed.). Springer Nature, pp. 297-308, ISBN 978-3-642-04843-2, 2009.

  13. Wei Lu and Ali A. Ghorbani. "Network Anomaly Detection Based on Wavelet Analysis." Special Issue on Signal Processing Applications in Network Intrusion Detection Systems, EURASIP Journal on Advances in Signal Processing, Article No. 4, pp. 1-16, Hindawi, Jan. 2009.

  14. Wei Lu, Hengjian Tong and Issa Traore. "E-means: An Evolutionary Clustering Algorithm." in Advances in Computation and Intelligence. Xuesong Yan (Ed.). Springer, pp. 537-545, ISBN 978-3-540-92137-0, 2008.

  15. Wei Lu and Issa Traore. "Unsupervised Anomaly Detection Using an Evolutionary Extension of K-means Algorithm." International Journal on Information and Computer Security, Volume 2, Number 2, pp. 107-139, Inderscience Publisher, May 2008.

  16. Wei Lu and Issa Traore. "A Novel Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-time." in Cryptology and Network Security. Y.G. Desmedt, H. Wang, Y. Mu, Y. Li, (Eds.). Springer Nature, pp. 96-109. ISBN 978-3-540-32298-6, 2005.

  17. Wei Lu and Issa Traore. "Detecting New Forms of Network Intrusion Using Genetic Programming." Computational Intelligence. Volume 20, Issue 3, pp. 475-494, Wiley Publisher, August 2004.

Peer-reviewed Journals/Book Chapters
Peer-reviewed Conference Proceedings
  1. Kole Nunley and Wei Lu. "Detecting Network Intrusions Using A Confidence-Based Reward System." In Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA-2018), Kracow, Poland, May 16 - 18, 2018.

  2. John Hancock, Wei Lu. A Cryptographic Suite for Securing UDP Communication Channel on the Internet (poster). The 2017 Zone 1 Conference of the American Society for Engineering Education, (ASEE2017), Lowell, MA USA, Apr. 27-29, 2017.

  3. Joshua Pritchett and Wei Lu. Mongoose, A Novel Lightweight Cross-Platform Botnet Over TOR. The 36th IEEE Symposium on Security and Privacy, SAN JOSE, CA, MAY 18-20, 2015.

  4. Andrea Doucette and Wei Lu, "An Intelligent Robotic System for Localization and Path Planning Using Depth First Search", in Proceedings of the 17th International Conference on Artificial Intelligence (ICAI 2015), Page(s): 401-402, July 29 2015, Las Vegas, NV, USA.

  5. Ling Xue and Wei Lu, "Profiling Behavior of Intruders on Enterprise Honeynet: Deployment and Analysis" (2015). In Proceedings of the 2015 International Conference on Information Resources Management. Ottawa, ON, Canada, May 18 - 20, 2015.

  6. Marjorie Droppa, Wei Lu, Shari Bemis, Liette Ocker, Mark Miller, "Integrated STEM learning within health science, mathematics and computer science", in Proceedings of 2015 IEEE Integrated STEM Education Conference (ISEC), Page(s): 242 - 245, ISBN: 978-1-4799-1828-7, Mar. 2015, Princeton, NJ. 

  7. Wei Lu and Michael Hanrahan. “Phylogenetic Analysis Using Bayesian Model.” In Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education, (ASEE2014), Bridgeport, CT USA, Apr. 3 - 5, 2014.

  8. Mark Miller, Wei Lu (Mentor). Classifying Social-Media Websites. The 2014 IEEE Zone 1 Conference of the American Society for Engineering Education, (ASEE2014), Bridgeport, CT USA, Apr. 3 - 5, 2014.

  9. Dan Garant, Wei Lu. “Mining Botnet Behaviors on the Large-scale Web Application Community.” In Proceedings of The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25 - 28, 2013.

  10. Wei Lu and Ali Ghorbani. ”A Multiple-stage Classifier for Identifying Unknown Internet Traffic.” in Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2011), Victoria, B.C., August 2011.

  11. Glenn Skoog and Wei Lu (Mentor). Profiling Hacker Behaviors Using Network Forensic Evidences with Honeynet (poster). The 2011 COPLAC Northeast Regional Undergraduate Research Conference, Oct. 2011, Keene NH USA.

  12. Sherif Saad, Issa Traore, Ali Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian. “Detecting P2P Botnets through Network Behavior Analysis and Machine Learning,” In Proceedings of 9th IEEE Annual Conference on Privacy, Security and Trust (PST2011), Montreal, Quebec, Canada. 

  13. Wei Lu, Mahbod Tavallaee and Ali. A. Ghorbani. "Automatic Discovery of Botnet Communities on Large-Scale Communication Networks." In Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, pp. 1-

  14. Wei Lu and Ali A. Ghorbani. "Hybrid Traffic Classification Approach Based on Decision Tree." In Proceedings of the Communications Quality of Service, Reliability Performance Modeling Symposium, IEEE Global Communications Conference (GLOBECOM 2009), pp. 1 - 6, USA.

  15. Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi and Ali A. Ghorbani. "BotCop: An Online Botnets Traffic Classifier." In Proceedings of the 7th Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, New Brunswick, Canada, May 11 - 13, 2009. pp. 70-77.

  16. Mahbod Tavallaee, Wei Lu, and Ali A. Ghorbani. "Online Classification of Network Flows." In Proceedings of the 7th Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, New Brunswick, Canada, May 11 - 13, 2009. pp. 78-85.

  17. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu and Ali A. Ghorbani. "A Detailed Analysis of the KDD CUP 99 Data Set." In Proceedings of the 2nd IEEE Symposium on Computational Intelligence for Security and Defense Applications, June 2009.

  18. Wei Lu, Mahbod Tavallaee and Ali. A. Ghorbani. "Detecting Network Anomalies Using Different Wavelet Basis Functions." In Proceedings of the 6th Annual Conference on Communication Networks and Services Research (CNSR 2008), Halifax, NS, pp. 149-156.

  19. Wei Lu and Ali A. Ghorbani. "Botnets Detection Based on IRC-Community." In Proceedings of the Communications and Information Security Symposium, Global Communications Conference (IEEE GLOBECOM 2008), Nov. 30 - Dec. 4, New Orleans, LA, USA. pp. 2067-2071.

  20. Mahbod Tavallaee, Wei Lu, Arif Iqbal and Ali A. Ghorbani. "A Novel Covariance Matrix Based Approach for Detecting Network Anomalies." In Proceedings of 6th Annual Conference on Communication Networks and Services Research (CNSR 2008), Halifax, NS, pp. 75-81, 2008.

  21. Wei Lu and Ali A. Ghorbani. "Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract)." Proceedings of 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg (Eds.): RAID 2008, LNCS 5230, pp. 415-416, MIT, Boston, USA 2008.

  22. Wei Lu and Issa Traore. "Determining the Optimal Number of Clusters Using a New Evolutionary Algorithm." In Proceedings of IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2005), pp. 712-713, Hongkong, November 2005.

  23. Wei Lu and Issa Traore. "An Unsupervised Approach for Detecting DDoS Attacks Based on Traffic Based Metrics." In Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2005), pp. 462-465, Victoria, B.C., August 2005.

  24. Wei Lu and Issa Traore. "A Novel Framework for Network Intrusion Detection Using Learning Techniques." In Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2005), pp. 458-461, Victoria, B.C., August 2005.

  25. Wei Lu and Issa Traore. "A New Evolutionary Algorithm for Determining the Optimal Number of Clusters." In Proceedings of IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA 2005), Volume 1, pp. 648-653, 2005.

  26. Wei Lu and Issa Traore. "Detecting New Forms of Network Intrusion Using Genetic Programming." In Proceedings of IEEE Congress on Evolutionary Computation (CEC 2003), pp. 2165-2172, 2003.