​
Login / Signup
Wei Li
Publication Activity (10 Years)
Years Active: 2005-2024
Publications (10 Years): 2
Top Topics
Visual Basic
Spam Filters
Api Calls
Feature Selection
Top Venues
SERA
ICISSP
</>
Publications
</>
Jackie Scott
,
Yair Levy
,
Wei Li
,
Ajoy Kumar
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations.
ICISSP
(2024)
Fred Guyton
,
Wei Li
,
Ling Wang
,
Ajoy Kumar
Android Feature Selection based on Permissions, Intents, and API Calls.
SERA
(2022)
Wei Li
,
Haishan Wan
,
Sheng Li
An approach to the generalization of firewall rules.
ICIS
(2013)
Raouf Alomainy
,
Wei Li
DDS: A Formal Framework and a Software Tool to Extract Object- Oriented Design State Space and Syntax-Based Metrics.
Int. J. Comput. Their Appl.
20 (2) (2013)
Wei Li
,
Haishan Wan
,
Xunyi Ren
,
Sheng Li
A Refined RBAC Model for Cloud Computing.
ACIS-ICIS
(2012)
Raouf Alomainy
,
Wei Li
Using Ponder as a Standard Security Specification Language in Heterogeneous Networks.
CAINE
(2009)
Wei Li
,
Raouf Alomainy
An Experimental Approach to Prove Metrics Properties.
Software Engineering Research and Practice
(2009)
Wei Li
A Space-Efficient Approach to Consistency Check of Firewall Rules.
CAINE
(2009)
Wei Li
Using Exploit Similarities for Concise Representation of Attack Scenarios.
CAINE
(2008)
Wei Li
,
Rayford B. Vaughn
Efficient Update on Exploitation Graphs for Vulnerability Analysis.
CAINE
(2007)
Wei Li
,
Rayford B. Vaughn
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering.
HICSS
(2006)
Wei Li
,
Rayford B. Vaughn
,
Yoginder S. Dandass
An Approach to Model Network Exploitations Using Exploitation Graphs.
Simul.
82 (8) (2006)
Wei Li
,
Rayford B. Vaughn
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
CCGRID
(2006)
Wei Li
A security engineering process for vulnerability assessment.
CAINE
(2006)
Wei Li
,
Edward B. Allen
An Access Control Model for Secure Cluster-Computing Environments.
HICSS
(2005)