A Space-Efficient Approach to Consistency Check of Firewall Rules
Wei Li
Part of the Physical Sciences and Mathematics Commons
Works by Wei Li in Physical Sciences and Mathematics
2018
2016
A Comparative Evaluation of Trust Models in P2P Networks
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2015
Evaluation of Recent Advances in Intrusion Detection for VoIP Systems
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Impact of Baseline Profile on Intrusion Detection in Mobile Ad Hoc Networks
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Finding Interesting Outliers - A Brief Network Based Approach
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2014
Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks
CCE Faculty Articles
2013
An Evaluation of the Minimum Expected Cost Metric for Intrusion Detection Systems
CCE Faculty Proceedings, Presentations, Speeches and Lectures
An Approach to the Generalization of Firewall Rules
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2012
A Refined RBAC Model for Cloud Computing
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2011
An Access Control Mechanism in Cloud Computing Environments
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Teaching Computer Networks for Distance Computer Science Students: An Instructor’s Perspective
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2010
A Tree-Based Model for Firewall Policy Management
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2009
A Space-Efficient Approach to Consistency Check of Firewall Rules
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Phishpin: An Integrated, Identity-Based Anti-Phishing Framework
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2008
Using Exploit Similarities for Concise Representation of Attack Scenarios
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2007
Efficient Update on Exploitation Graphs for Vulnerability Analysis
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2006
A Security Engineering Process for Vulnerability Assessment
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Modeling and Simulating Network Exploitations Using Simplified Exploitation Graphs
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2005
Using Exploitation Graphs to Model Network Exploitations
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Building Compact Exploitation Graphs for a Cluster Computing Environment
CCE Faculty Proceedings, Presentations, Speeches and Lectures
An Approach to Model Network Exploitations Using Exploitation Graphs
CCE Faculty Proceedings, Presentations, Speeches and Lectures
An Access Control Model for Secure Cluster-Computing Environments
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2004
Using Genetic Algorithm for Network Intrusion Detection
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Graph Based Network Vulnerability Analysis and Alert Correlation
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2002
The Integration of Security Sensors into Intelligent Intrusion Detection System in a Cluster Environment
CCE Faculty Proceedings, Presentations, Speeches and Lectures