Wei Li

Affiliations:
  • Nova Southeastern University, Fort Lauderdale, FL, USA
  • Mississippi State University, Starkville, MS, USA (PhD 2005)


According to our database1, Wei Li authored at least 18 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2022
Android Feature Selection based on Permissions, Intents, and API Calls.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022

Proposed Empirical Assessment of Remote Workers' Cyberslacking and Computer Security Posture to Assess Organizational Cybersecurity Risks.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2022

2015
Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Computer and Information Science, 2015

2013
DDS: A Formal Framework and a Software Tool to Extract Object- Oriented Design State Space and Syntax-Based Metrics.
Int. J. Comput. Their Appl., 2013

An approach to the generalization of firewall rules.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

2012
A Refined RBAC Model for Cloud Computing.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2009
An Experimental Approach to Prove Metrics Properties.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009

Phishpin: An Integrated Anti-Phishing Framework.
Proceedings of the 2009 International Conference on Security & Management, 2009

A Space-Efficient Approach to Consistency Check of Firewall Rules.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

Using Ponder as a Standard Security Specification Language in Heterogeneous Networks.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

2008
Using Exploit Similarities for Concise Representation of Attack Scenarios.
Proceedings of the ISCA 21st International Conference on Computer Applications in Industry and Engineering, 2008

2007
Efficient Update on Exploitation Graphs for Vulnerability Analysis.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

2006
An Approach to Model Network Exploitations Using Exploitation Graphs.
Simul., 2006

Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

A security engineering process for vulnerability assessment.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

2005
An Access Control Model for Secure Cluster-Computing Environments.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005


  Loading...