Using genetic algorithm for network intrusion detection W Li Proceedings of the United States department of energy cyber security group 1 …, 2004 | 498 | 2004 |
Machine learning detects pan-cancer ras pathway activation in the cancer genome atlas GP Way, F Sanchez-Vega, K La, J Armenia, WK Chatila, A Luna, ... Cell reports 23 (1), 172-180. e3, 2018 | 161 | 2018 |
Cluster security research involving the modeling of network exploitations using exploitation graphs W Li, RB Vaughn Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006 | 110 | 2006 |
An approach to model network exploitations using exploitation graphs W Li, RB Vaughn, YS Dandass Simulation 82 (8), 523-541, 2006 | 52 | 2006 |
A refined RBAC model for cloud computing W Li, H Wan, X Ren, S Li 2012 IEEE/ACIS 11th International Conference on Computer and Information …, 2012 | 39 | 2012 |
An approach to graph-based modeling of network exploitations W Li Mississippi State University, 2005 | 26 | 2005 |
Detection and prevention of attacks in MANETs by improving the EAACK protocol E Hmouda, W Li SoutheastCon 2018, 1-7, 2018 | 11 | 2018 |
Building compact exploitation graphs for a cluster computing environment W Li, R Vaughn Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 50-57, 2005 | 10 | 2005 |
An access control model for secure cluster-computing environments W Li, EB Allen Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 10 | 2005 |
Generating predicate logic expressions from natural language O Levkovskyi, W Li SoutheastCon 2021, 1-8, 2021 | 8 | 2021 |
SUBJECT MATTER EXPERTS’FEEDBACK ON EXPERIMENTAL PROCEDURES TO MEASURE USER’S JUDGMENT ERRORS IN SOCIAL ENGINEERING ATTACKS T Pollock, Y Levy, W Li, A Kumar Journal of Cybersecurity Education, Research and Practice 2021 (2), 4, 2022 | 7 | 2022 |
Performance evaluation of unsupervised learning techniques for intrusion detection in mobile ad hoc networks BH Dang, W Li Computer and Information Science, 71-86, 2015 | 7 | 2015 |
Empirical results of an experimental study on the role of password strength and cognitive load on employee productivity S Mujeye, Y Levy, H Mattord, W Li Online Journal of Applied Knowledge Management (OJAKM) 4 (1), 99-116, 2016 | 6 | 2016 |
Android Feature Selection based on Permissions, Intents, and API Calls F Guyton, W Li, L Wang, A Kumar 2022 IEEE/ACIS 20th International Conference on Software Engineering …, 2022 | 4 | 2022 |
Validity Based Approach for Feature Selection in Intrusion Detection Systems E Hmouda, W Li 2020 SoutheastCon, 1-8, 2020 | 4 | 2020 |
Proposed Empirical Assessment of Remote Workers' Cyberslacking and Computer Security Posture to Assess Organizational Cybersecurity Risks A Luna, Y Levy, G Simco, W Li 2022 IEEE High Performance Extreme Computing Conference (HPEC), 1-2, 2022 | 3 | 2022 |
Assignment Algorithms for Grocery Bill Reduction M Courcy, W Li SoutheastCon 2021, 1-7, 2021 | 3 | 2021 |
An approach to the generalization of firewall rules W Li, H Wan, S Li 2013 IEEE/ACIS 12th International Conference on Computer and Information …, 2013 | 3 | 2013 |
Pre-Requirements Traceability W Li, R Vaughn, H Saiedian Encyclopedia of Software Engineering 61, 2002 | 3 | 2002 |
Analysis of Feature Selection Techniques for Android Malware Detection F Guyton, W Li, L Wang, A Kumar SoutheastCon 2022, 96-103, 2022 | 2 | 2022 |