About
28
Publications
5,463
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
495
Citations
Introduction
Wei Li currently works at the College of Engineering and Computing, Nova Southeastern University. Wei does research in Computer Security and Reliability and Computer Communications (Networks). He is a senior member of IEEE and a member of ACM.
Skills and Expertise
Current institution
Additional affiliations
August 2005 - December 2020
Publications
Publications (28)
Clustering is a fundamental task in unsupervised learning and is important for extracting interesting patterns and structures within data. Evaluating the quality of clustering algorithms is a complex task, often requiring a balance between
homogeneity and completeness. In this paper, we apply V-measure as an evaluation metric that effectively deter...
Purpose
The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put indiv...
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity ris...
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity ris...
Distracted users appear to have difficulties correctly distinguishing between legitimate and malicious emails or search engine results. Additionally, mobile phone users appear to have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the goal of...
Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauth...
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research stu...
Phishing continues to be a significant invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using email, and malicious search engine links to gather personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining financial ac...
Computer networks are vulnerable to growing
number of security threats. The increase of attacks has caused
obvious damages throughout the network at individual,
enterprise, and government level. Intrusion detection systems are
one of the tools that detect and remedy the presence of malicious
activities. Intrusion detection systems face many challen...
Mobile Ad Hoc Networks are dynamic in nature and have no rigid or reliable network infrastructure by their very definition. They are expected to be self-governed and have dynamic wireless links which are not entirely reliable in terms of connectivity and security. Several factors could cause their degradation, such as attacks by malicious and selfi...
The demand for information system authentication has significantly increased over the last decade. Research has shown that the majority of user authentications remain to be password based, however, it is well documented that passwords have significant limitations. To address this issue, companies have been placing increased requirements on the user...
Modern firewalls are becoming complex and anomalies may exist in their rule sets. Security log data, such as firewall logs and logs generated by intrusion detection systems, could provide useful information for the update and addition of existing firewall rule sets. In this paper, we focus on the development of an effective mechanism for firewall r...
Cloud computing is a fast growing field which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources on based on their payments. This paper discusses cloud computing and its related security risks, with a focus on access control. As a traditional access...
This paper shows some experiences and observations on distance education in teaching a Computer Networks course for Computer Science masters students in an US institution. Some lessons and effective strategies to better engage students are presented. Data has been collected to show the effectiveness of distance education in teaching the course. Stu...
Firewalls have been widely used in organizations to implement access control policies. However complicated management of firewall rule set has caused overheads and reduced the responsiveness of organizations. In this paper, we propose a solution for firewall rule management with a special aim at consistency check of firewall rules. We use Bloom fil...
Attack graphs have been used to simulate attack scenarios to provide solutions for vulnerability analysis. However the scalability issue of attack graphs is still a big challenge. In this paper we present a detailed analysis on the scalability issue for attack graph. We also propose an approach to simplify attack graphs based on the similarity feat...
A graph-based attack modeling technique is a formal approach for representing attack scenarios. One approach in this area is referred to as an exploitation graph (e-graph). This paper extends previous work on the e-graph approach by adding a function to efficiently insert new exploitations into the generated e-graph. The proposed algorithm has a ti...
In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (e-graphs) that are used to represent attack scenarios...
In this paper, we overview cluster security research underway at Mississippi State University (MSU) and focus on one particular effort involving a process to model system vulnerabilities and possible exploitations in specific cluster environments using exploitation graphs (e-graphs). Cluster security research at MSU has included attacks against clu...
In this paper, we define a process to model and simulate attack scenarios in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are associated to create exploitation graphs (e-graphs) which are used to represent attack scenarios. Experiments carried out in a cluster computing enviro...
In this paper, a modeling process is described to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are combined to create exploitation graphs (e-graphs), which are used to represent attack scenarios...
As an emerging domain in high-performance computing, cluster computing is being widely used. However, there is little research work that comprehensively studies the security requirements in cluster-computing environments. Security mechanisms are important for cluster computing, especially when clusters are part of high-assurance systems. In this pa...
This paper describes a technique of applying Genetic Algorithm (GA) to network Intrusion Detection Systems (IDSs). A brief overview of the Intrusion Detection System, genetic algorithm, and related detection techniques is presented. Parameters and evolution process for GA are discussed in detail. Unlike other implementations of the same problem, th...