关注
Wenjuan Li
Wenjuan Li
The Hong Kong Polytechnic University
在 cityu.edu.hk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
W Li, W Meng, LF Kwok
Journal of Network and Computer Applications 68, 126-139, 2016
1792016
Designing collaborative blockchained signature-based intrusion detection in IoT environments
W Li, S Tug, W Meng, Y Wang
Future Generation Computer Systems 96, 481-489, 2019
1422019
EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
W Meng, W Li, LF Kwok
computers & security 43, 189-204, 2014
1002014
Enhancing medical smartphone networks via blockchain-based trust management against insider attacks
W Meng, W Li, L Zhu
IEEE Transactions on Engineering Management 67 (4), 1377-1386, 2019
982019
A blockchain-empowered AAA scheme in the large-scale HetNet
N Shi, L Tan, W Li, X Qi, K Yu
Digital Communications and Networks 7 (3), 308-316, 2021
912021
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
Ieee Access 6, 7234-7243, 2017
882017
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
W Li, W Meng, LF Kwok, HS Horace
Journal of Network and Computer Applications 77, 135-145, 2017
812017
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
W Meng, W Li, LF Kwok
Security and Communication Networks 8 (18), 3883-3895, 2015
802015
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments
W Li, W Meng, MH Au
Journal of Network and Computer Applications 161, 102631, 2020
792020
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
W Meng, W Li, Y Xiang, KKR Choo
Journal of Network and Computer Applications 78, 162-169, 2017
712017
A fog-based privacy-preserving approach for distributed signature-based intrusion detection
Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang
Journal of Parallel and Distributed Computing 122, 26-35, 2018
622018
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks
W Li, W Meng, LF Kwok
The 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM …, 2014
582014
Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges
W Li, Y Meng, LF Kwok
2013 ninth international conference on computational intelligence and …, 2013
572013
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
W Meng, W Li, Y Wang, MH Au
Future Generation Computer Systems 108, 1258-1266, 2020
562020
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems
Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue
Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019
542019
An improved particle swarm optimization algorithm suitable for photovoltaic power tracking under partial shading conditions
K Hu, S Cao, W Li, F Zhu
IEEE Access 7, 143217-143232, 2019
502019
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions
W Li, J Wu, J Cao, N Chen, Q Zhang, R Buyya
Journal of Cloud Computing 10 (1), 1-34, 2021
482021
Design of multi-view based email classification for IoT systems via semi-supervised learning
W Li, W Meng, Z Tan, Y Xiang
Journal of Network and Computer Applications 128, 56-63, 2019
472019
Towards effective trust-based packet filtering in collaborative network environments
W Meng, W Li, LF Kwok
IEEE Transactions on Network and Service Management 14 (1), 233-245, 2017
462017
Toward a blockchain-based framework for challenge-based collaborative intrusion detection
W Li, Y Wang, J Li, MH Au
International Journal of Information Security 20, 127-139, 2021
442021
系统目前无法执行此操作,请稍后再试。
文章 1–20