Wei Li
Affiliations:- Nova Southeastern University, Fort Lauderdale, FL, USA
- Mississippi State University, Starkville, MS, USA (PhD 2005)
According to our database1,
Wei Li
authored at least 18 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
2022
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022
Proposed Empirical Assessment of Remote Workers' Cyberslacking and Computer Security Posture to Assess Organizational Cybersecurity Risks.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2022
2015
Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Computer and Information Science, 2015
2013
DDS: A Formal Framework and a Software Tool to Extract Object- Oriented Design State Space and Syntax-Based Metrics.
Int. J. Comput. Their Appl., 2013
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013
2012
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012
2009
An Experimental Approach to Prove Metrics Properties.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009
Phishpin: An Integrated Anti-Phishing Framework.
Proceedings of the 2009 International Conference on Security & Management, 2009
A Space-Efficient Approach to Consistency Check of Firewall Rules.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009
Using Ponder as a Standard Security Specification Language in Heterogeneous Networks.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009
2008
Using Exploit Similarities for Concise Representation of Attack Scenarios.
Proceedings of the ISCA 21st International Conference on Computer Applications in Industry and Engineering, 2008
2007
Efficient Update on Exploitation Graphs for Vulnerability Analysis.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
2006
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
A security engineering process for vulnerability assessment.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006
2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005