Part of the Physical Sciences and Mathematics Commons

Works by Wei Li in Physical Sciences and Mathematics

2018

A Space-Efficient Approach to Consistency Check of Firewall Rules, Wei Li
Wei Li

An Approach to Model Network Exploitations Using Exploitation Graphs, Wei Li, Rayford B. Vaughn, Yoginder S. Dandass
Wei Li

2016

A Comparative Evaluation of Trust Models in P2P Networks, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Empirical results of an experimental study on the role of password strength and cognitive load on employee productivity, Stephen Mujeye, Yair Levy, Herbert Mattord, Wei Li
CCE Faculty Articles

PDF

2015

Evaluation of Recent Advances in Intrusion Detection for VoIP Systems, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Impact of Baseline Profile on Intrusion Detection in Mobile Ad Hoc Networks, Wei Li, Binh Hy Dang
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Finding Interesting Outliers - A Brief Network Based Approach, Adnan Masood, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2014

Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks, Binh Hy Dang, Wei Li
CCE Faculty Articles

2013

An Evaluation of the Minimum Expected Cost Metric for Intrusion Detection Systems, Wei Li, S. Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

An Approach to the Generalization of Firewall Rules, Wei Li, H. Wan, S. Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2012

A Refined RBAC Model for Cloud Computing, Wei Li, H. Wan, X. Ren, S. Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2011

An Access Control Mechanism in Cloud Computing Environments, Wei Li, S. Li, H. Wan
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Teaching Computer Networks for Distance Computer Science Students: An Instructor’s Perspective, Peixiang Liu, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2010

A Tree-Based Model for Firewall Policy Management, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2009

A Space-Efficient Approach to Consistency Check of Firewall Rules, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Phishpin: An Integrated, Identity-Based Anti-Phishing Framework, Wei Li, Hicham Refaat Tout, W. Hafner, Easwar A. Nyshadham
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2008

Using Exploit Similarities for Concise Representation of Attack Scenarios, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2007

Efficient Update on Exploitation Graphs for Vulnerability Analysis, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2006

A Security Engineering Process for Vulnerability Assessment, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Modeling and Simulating Network Exploitations Using Simplified Exploitation Graphs, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures

An Approach to Model Network Exploitations Using Exploitation Graphs, Wei Li, Rayford B. Vaughn, Yoginder S. Dandass
CCE Faculty Articles

2005

Using Exploitation Graphs to Model Network Exploitations, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Building Compact Exploitation Graphs for a Cluster Computing Environment, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures

An Approach to Model Network Exploitations Using Exploitation Graphs, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures

An Access Control Model for Secure Cluster-Computing Environments, Wei Li, E. Allen
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2004

Using Genetic Algorithm for Network Intrusion Detection, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Graph Based Network Vulnerability Analysis and Alert Correlation, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

2002

The Integration of Security Sensors into Intelligent Intrusion Detection System in a Cluster Environment, Wei Li
CCE Faculty Proceedings, Presentations, Speeches and Lectures

Pre-Requirements Traceability, Wei Li, R. Vaughn, H. Saiedian
CCE Faculty Books and Book Chapters

2001

Towards Requirements Traceability, Wei Li, Rayford B. Vaughn
CCE Faculty Proceedings, Presentations, Speeches and Lectures