Using genetic algorithm for network intrusion detection W Li Proceedings of the United States department of energy cyber security group 1 …, 2004 | 495 | 2004 |
Cluster security research involving the modeling of network exploitations using exploitation graphs W Li, RB Vaughn Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006 | 108 | 2006 |
An approach to model network exploitations using exploitation graphs W Li, RB Vaughn, YS Dandass Simulation 82 (8), 523-541, 2006 | 52 | 2006 |
A refined RBAC model for cloud computing W Li, H Wan, X Ren, S Li 2012 IEEE/ACIS 11th International Conference on Computer and Information …, 2012 | 33 | 2012 |
An approach to graph-based modeling of network exploitations W Li Mississippi State University, 2005 | 26 | 2005 |
Detection and prevention of attacks in MANETs by improving the EAACK protocol E Hmouda, W Li SoutheastCon 2018, 1-7, 2018 | 10 | 2018 |
Building compact exploitation graphs for a cluster computing environment W Li, R Vaughn Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 50-57, 2005 | 10 | 2005 |
An access control model for secure cluster-computing environments W Li, EB Allen Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 10 | 2005 |
Generating predicate logic expressions from natural language O Levkovskyi, W Li SoutheastCon 2021, 1-8, 2021 | 6 | 2021 |
Empirical results of an experimental study on the role of password strength and cognitive load on employee productivity S Mujeye, Y Levy, H Mattord, W Li Online Journal of Applied Knowledge Management (OJAKM) 4 (1), 99-116, 2016 | 6 | 2016 |
Performance evaluation of unsupervised learning techniques for intrusion detection in mobile ad hoc networks BH Dang, W Li Computer and Information Science, 71-86, 2015 | 6 | 2015 |
SUBJECT MATTER EXPERTS’FEEDBACK ON EXPERIMENTAL PROCEDURES TO MEASURE USER’S JUDGMENT ERRORS IN SOCIAL ENGINEERING ATTACKS T Pollock, Y Levy, W Li, A Kumar Journal of Cybersecurity Education, Research and Practice 2021 (2), 4, 2022 | 5 | 2022 |
Android Feature Selection based on Permissions, Intents, and API Calls F Guyton, W Li, L Wang, A Kumar 2022 IEEE/ACIS 20th International Conference on Software Engineering …, 2022 | 3 | 2022 |
Validity Based Approach for Feature Selection in Intrusion Detection Systems E Hmouda, W Li 2020 SoutheastCon, 1-8, 2020 | 3 | 2020 |
An approach to the generalization of firewall rules W Li, H Wan, S Li 2013 IEEE/ACIS 12th International Conference on Computer and Information …, 2013 | 3 | 2013 |
Pre-Requirements Traceability W Li, R Vaughn, H Saiedian Encyclopedia of Software Engineering 61, 2002 | 3 | 2002 |
Analysis of Feature Selection Techniques for Android Malware Detection F Guyton, W Li, L Wang, A Kumar SoutheastCon 2022, 96-103, 2022 | 2 | 2022 |
Towards an Assessment of Judgment Errors in Social Engineering Attacks Due to Environment and Device Type T Pollock, Y Levy, W Li, A Kumar | 2 | 2020 |
Modeling and simulating system exploitations through exploitation graphs for security engineering W Li, RB Vaughn Proceedings of the 39th Annual Hawaii International Conference on System …, 2006 | 2 | 2006 |
Using Exploitation Graphs to Model Network Exploitations W Li, RB Vaughn | 2 | 2005 |