Miss LI Wenjuan (李文娟)

Research Output

  1. 2014
  2. Published

    A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends

    Meng, Y., Li, W. & Kwok, L., 29 Aug 2014, Case Studies in Secure Computing: Achievements and Trends. Issac, B. & Israr, N. (eds.). New York: CRC Press, p. 189-206

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)12_Chapter in an edited book (Author)

    Check@CityULib
  3. Published

    Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks

    Li, W., Meng, W. & Kwok, L., Jul 2014, Trust Management VIII. Springer New York LLC, Vol. 430. p. 61-76 (IFIP Advances in Information and Communication Technology; vol. 430).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 31
    Check@CityULib
  4. Published

    EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism

    Meng, W., Li, W. & Kwok, L., Jun 2014, In : Computers and Security. 43, p. 189-204

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 53
    Check@CityULib
  5. Published

    Design of cloud-based parallel exclusive signature matching model in intrusion detection

    Meng, Y., Li, W. & Kwok, L., 2014, Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013. IEEE Computer Society, p. 175-182 6831916

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 7
    Check@CityULib
  6. Published

    Enhancing email classification using data reduction and disagreement-based semi-supervised learning

    Meng, Y., Li, W. & Kwok, L., 2014, 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, p. 622-627 6883388

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 11
    Check@CityULib
  7. 2013
  8. Published

    Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection

    Meng, Y., Li, W. & Kwok, L., 9 Dec 2013, In : Computer Networks. 57, 17, p. 3630-3640

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 26
    Check@CityULib
  9. Published

    Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection Networks: Feasibility and challenges

    Li, W., Meng, Y. & Kwok, L., Dec 2013, Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013. p. 518-522 6746483

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 36
    Check@CityULib
  10. Published

    Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection

    Meng, Y., Li, W. & Kwok, L., Jun 2013, Network and System Security: 7th International Conference, NSS 2013, Proceedings. Springer Verlag, Vol. 7873 LNCS. p. 40-53 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7873 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 17
    Check@CityULib
  11. Published

    Enhancing click-draw based graphical passwords using multi-touch on mobile phones

    Meng, Y., Li, W. & Kwok, L., 2013, Security and Privacy Protection in Information Processing Systems. Springer New York LLC, Vol. 405. p. 55-68 (IFIP Advances in Information and Communication Technology; vol. 405).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 15
    Check@CityULib
  12. Published

    Towards adaptive false alarm reduction using Cloud as a Service

    Meng, Y., Li, W. & Kwok, L., 2013, 2013 8th International ICST Conference on Communications and Networking in China, CHINACOM 2013 - Proceedings. p. 420-425 6694633

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 4
    Check@CityULib
  13. Published

    Towards designing privacy-preserving signature-based IDS as a service: A study and practice

    Meng, Y., Li, W., Kwok, L. & Xiang, Y., 2013, Proceedings - 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013. p. 181-188 6630405

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 9
    Check@CityULib
  14. 2012
  15. Published

    Towards designing packet filter with a trust-based approach using Bayesian inference in network intrusion detection

    Meng, Y., Kwok, L. & Li, W., Sep 2012, Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Revised Selected Papers. Vol. 106 LNICS. p. 203-221 (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 106 LNICS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 18
    Check@CityULib
  16. Published

    Intelligent alarm filter using knowledge-based alert verification in network intrusion detection

    Meng, Y., Li, W. & Kwok, L., 2012, Foundations of Intelligent Systems: 20th International Symposium, ISMIS 2012, Proceedings. Springer Verlag, Vol. 7661 LNAI. p. 115-124 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7661 LNAI).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 10
    Check@CityULib
  17. Published

    Single character frequency-based exclusive signature matching scheme

    Meng, Y., Li, W. & Kwok, L., 2012, Computer and Information Science 2012. Springer, p. 67-80 (Studies in Computational Intelligence; vol. 429).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 6
    Check@CityULib
Previous 1 2 3 Next