Follow
Wei Li
Wei Li
Professor of Computer Science and Cybersecurity, Nova Southeastern University
Verified email at nova.edu - Homepage
Title
Cited by
Cited by
Year
Using genetic algorithm for network intrusion detection
W Li
Proceedings of the United States department of energy cyber security group 1 …, 2004
4982004
Machine learning detects pan-cancer ras pathway activation in the cancer genome atlas
GP Way, F Sanchez-Vega, K La, J Armenia, WK Chatila, A Luna, ...
Cell reports 23 (1), 172-180. e3, 2018
1612018
Cluster security research involving the modeling of network exploitations using exploitation graphs
W Li, RB Vaughn
Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006
1102006
An approach to model network exploitations using exploitation graphs
W Li, RB Vaughn, YS Dandass
Simulation 82 (8), 523-541, 2006
522006
A refined RBAC model for cloud computing
W Li, H Wan, X Ren, S Li
2012 IEEE/ACIS 11th International Conference on Computer and Information …, 2012
392012
An approach to graph-based modeling of network exploitations
W Li
Mississippi State University, 2005
262005
Detection and prevention of attacks in MANETs by improving the EAACK protocol
E Hmouda, W Li
SoutheastCon 2018, 1-7, 2018
112018
Building compact exploitation graphs for a cluster computing environment
W Li, R Vaughn
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 50-57, 2005
102005
An access control model for secure cluster-computing environments
W Li, EB Allen
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
102005
Generating predicate logic expressions from natural language
O Levkovskyi, W Li
SoutheastCon 2021, 1-8, 2021
82021
SUBJECT MATTER EXPERTS’FEEDBACK ON EXPERIMENTAL PROCEDURES TO MEASURE USER’S JUDGMENT ERRORS IN SOCIAL ENGINEERING ATTACKS
T Pollock, Y Levy, W Li, A Kumar
Journal of Cybersecurity Education, Research and Practice 2021 (2), 4, 2022
72022
Performance evaluation of unsupervised learning techniques for intrusion detection in mobile ad hoc networks
BH Dang, W Li
Computer and Information Science, 71-86, 2015
72015
Empirical results of an experimental study on the role of password strength and cognitive load on employee productivity
S Mujeye, Y Levy, H Mattord, W Li
Online Journal of Applied Knowledge Management (OJAKM) 4 (1), 99-116, 2016
62016
Android Feature Selection based on Permissions, Intents, and API Calls
F Guyton, W Li, L Wang, A Kumar
2022 IEEE/ACIS 20th International Conference on Software Engineering …, 2022
42022
Validity Based Approach for Feature Selection in Intrusion Detection Systems
E Hmouda, W Li
2020 SoutheastCon, 1-8, 2020
42020
Proposed Empirical Assessment of Remote Workers' Cyberslacking and Computer Security Posture to Assess Organizational Cybersecurity Risks
A Luna, Y Levy, G Simco, W Li
2022 IEEE High Performance Extreme Computing Conference (HPEC), 1-2, 2022
32022
Assignment Algorithms for Grocery Bill Reduction
M Courcy, W Li
SoutheastCon 2021, 1-7, 2021
32021
An approach to the generalization of firewall rules
W Li, H Wan, S Li
2013 IEEE/ACIS 12th International Conference on Computer and Information …, 2013
32013
Pre-Requirements Traceability
W Li, R Vaughn, H Saiedian
Encyclopedia of Software Engineering 61, 2002
32002
Analysis of Feature Selection Techniques for Android Malware Detection
F Guyton, W Li, L Wang, A Kumar
SoutheastCon 2022, 96-103, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20