Wenjuan Li
Wenjuan Li
Department of Computer Science, City University of Hong Kong
Verified email at cityu.edu.hk - Homepage
Title
Cited by
Cited by
Year
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
W Li, W Meng, LF Kwok
Journal of Network and Computer Applications 68, 126-139, 2016
972016
EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
W Meng, W Li, LF Kwok
computers & security 43, 189-204, 2014
572014
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
W Meng, W Li, Y Xiang, KKR Choo
Journal of Network and Computer Applications 78, 162-169, 2017
452017
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
W Li, W Meng, LF Kwok, HS Horace
Journal of Network and Computer Applications 77, 135-145, 2017
442017
Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges
W Li, Y Meng, LF Kwok
2013 Ninth International Conference on Computational Intelligence and …, 2013
372013
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
W Meng, W Li, LF Kwok
Security and Communication Networks 8 (18), 3883-3895, 2015
362015
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
Ieee Access 6, 7234-7243, 2017
332017
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection
Y Meng, W Li, LF Kwok
Computer Networks 57 (17), 3630-3640, 2013
302013
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks
W Li, W Meng, LF Kwok
The 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM …, 2014
292014
Designing collaborative blockchained signature-based intrusion detection in IoT environments
W Li, S Tug, W Meng, Y Wang
Future Generation Computer Systems 96, 481-489, 2019
252019
PMFA: toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks
W Li, W Meng, HHS Ip
International Conference on Network and System Security, 433-449, 2016
252016
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks
W Li, W Meng
Information & Computer Security, 2016
242016
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones
W Meng, W Li, LF Kwok, KKR Choo
Computers & security 65, 213-229, 2017
232017
Enhancing click-draw based graphical passwords using multi-touch on mobile phones
Y Meng, W Li
IFIP International Information Security Conference, 55-68, 2013
222013
TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones
W Meng, W Li, DS Wong, J Zhou
International Conference on Applied Cryptography and Network Security, 629-647, 2016
192016
Towards designing packet filter with a trust-based approach using Bayesian inference in network intrusion detection
Y Meng, W Li
International Conference on Security and Privacy in Communication Systems …, 2012
192012
Towards effective trust-based packet filtering in collaborative network environments
W Meng, W Li, LF Kwok
IEEE Transactions on Network and Service Management 14 (1), 233-245, 2017
182017
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection
W Li, W Meng, X Luo, LF Kwok
Computers & Security 60, 177-192, 2016
172016
Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection
Y Meng, W Li
International Conference on Network and System Security, 40-53, 2013
162013
Investigating the influence of special on–off attacks on challenge-based collaborative intrusion detection networks
W Li, W Meng
Future Internet 10 (1), 6, 2018
152018
The system can't perform the operation now. Try again later.
Articles 1–20