Li Wang

Affiliations:
  • Huazhong University of Science and Technology, Wuhan, China
  • University of New Brunswick, Fredericton, New Brunswick, Canada


According to our database1, Li Wang authored at least 19 papers between 2006 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
A novel real-time aggregation method on network security events.
Kybernetes, 2011

2010
A novel technique of recognising multi-stage attack behaviour.
Int. J. High Perform. Comput. Netw., 2010

2007
Automatic attack plan recognition from intrusion alerts.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Attack scenario construction with a new sequential mining technique.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Towards Identifying True Threat from Network Security Data.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Discovering Novel Multistage Attack Patterns in Alert Streams.
Proceedings of the International Conference on Networking, 2007

Assessing Attack Threat by the Probability of Following Attacks.
Proceedings of the International Conference on Networking, 2007

A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Learning attack strategies through mining and correlation of security alarms.
Proceedings of the Integrated Network Management, 2007

Real-Time Correlation of Network Security Alerts.
Proceedings of ICEBE 2007, 2007

Mining Attack Correlation Scenarios Based on Multi-agent System.
Proceedings of the Human Interface and the Management of Information. Methods, 2007

The Global Synthetical Processing of Network Security Events.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Reducing False Positives Based on Time Sequence Analysis.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Discovering Novel Multistage Attack Strategies.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

2006
A novel technique of recognizing multi-stage attack behaviour.
Proceedings of the 2006 International Workshop on Networking, 2006

Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function.
Proceedings of the Intelligent Computing, 2006

A novel algorithm SF for mining attack scenarios model.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006


  Loading...