Follow
Wei Li
Wei Li
Professor of Computer Science and Cybersecurity, Nova Southeastern University
Verified email at nova.edu - Homepage
Title
Cited by
Cited by
Year
Using genetic algorithm for network intrusion detection
W Li
Proceedings of the United States department of energy cyber security group 1 …, 2004
4932004
Cluster security research involving the modeling of network exploitations using exploitation graphs
W Li, RB Vaughn
Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006
1072006
An approach to model network exploitations using exploitation graphs
W Li, RB Vaughn, YS Dandass
Simulation 82 (8), 523-541, 2006
522006
A refined RBAC model for cloud computing
W Li, H Wan, X Ren, S Li
2012 IEEE/ACIS 11th International Conference on Computer and Information …, 2012
332012
An approach to graph-based modeling of network exploitations
W Li
Mississippi State University, 2005
262005
Detection and prevention of attacks in MANETs by improving the EAACK protocol
E Hmouda, W Li
SoutheastCon 2018, 1-7, 2018
102018
Building compact exploitation graphs for a cluster computing environment
W Li, R Vaughn
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 50-57, 2005
102005
An access control model for secure cluster-computing environments
W Li, EB Allen
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
102005
Generating predicate logic expressions from natural language
O Levkovskyi, W Li
SoutheastCon 2021, 1-8, 2021
62021
Empirical results of an experimental study on the role of password strength and cognitive load on employee productivity
S Mujeye, Y Levy, H Mattord, W Li
Online Journal of Applied Knowledge Management (OJAKM) 4 (1), 99-116, 2016
62016
Performance evaluation of unsupervised learning techniques for intrusion detection in mobile ad hoc networks
BH Dang, W Li
Computer and Information Science, 71-86, 2015
62015
SUBJECT MATTER EXPERTS’FEEDBACK ON EXPERIMENTAL PROCEDURES TO MEASURE USER’S JUDGMENT ERRORS IN SOCIAL ENGINEERING ATTACKS
T Pollock, Y Levy, W Li, A Kumar
Journal of Cybersecurity Education, Research and Practice 2021 (2), 4, 2022
52022
Android Feature Selection based on Permissions, Intents, and API Calls
F Guyton, W Li, L Wang, A Kumar
2022 IEEE/ACIS 20th International Conference on Software Engineering …, 2022
32022
Validity Based Approach for Feature Selection in Intrusion Detection Systems
E Hmouda, W Li
2020 SoutheastCon, 1-8, 2020
32020
An approach to the generalization of firewall rules
W Li, H Wan, S Li
2013 IEEE/ACIS 12th International Conference on Computer and Information …, 2013
32013
Pre-Requirements Traceability
W Li, R Vaughn, H Saiedian
Encyclopedia of Software Engineering 61, 2002
32002
Analysis of Feature Selection Techniques for Android Malware Detection
F Guyton, W Li, L Wang, A Kumar
SoutheastCon 2022, 96-103, 2022
22022
Towards an Assessment of Judgment Errors in Social Engineering Attacks Due to Environment and Device Type
T Pollock, Y Levy, W Li, A Kumar
22020
Modeling and simulating system exploitations through exploitation graphs for security engineering
W Li, RB Vaughn
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
22006
Using Exploitation Graphs to Model Network Exploitations
W Li, RB Vaughn
22005
The system can't perform the operation now. Try again later.
Articles 1–20