Wei Li

Wei Li
Verified
Wei verified their affiliation via an institutional email.
Verified
Wei verified their affiliation via an institutional email.
  • PhD
  • Professor at Nova Southeastern University

About

28
Publications
5,463
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
495
Citations
Introduction
Wei Li currently works at the College of Engineering and Computing, Nova Southeastern University. Wei does research in Computer Security and Reliability and Computer Communications (Networks). He is a senior member of IEEE and a member of ACM.
Current institution
Nova Southeastern University
Current position
  • Professor
Additional affiliations
August 2005 - December 2020
Nova Southeastern University
Position
  • Professor

Publications

Publications (28)
Conference Paper
Clustering is a fundamental task in unsupervised learning and is important for extracting interesting patterns and structures within data. Evaluating the quality of clustering algorithms is a complex task, often requiring a balance between homogeneity and completeness. In this paper, we apply V-measure as an evaluation metric that effectively deter...
Article
Purpose The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put indiv...
Article
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity ris...
Conference Paper
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity ris...
Article
Full-text available
Distracted users appear to have difficulties correctly distinguishing between legitimate and malicious emails or search engine results. Additionally, mobile phone users appear to have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the goal of...
Article
Full-text available
Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauth...
Article
Full-text available
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research stu...
Article
Full-text available
Phishing continues to be a significant invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using email, and malicious search engine links to gather personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining financial ac...
Conference Paper
Computer networks are vulnerable to growing number of security threats. The increase of attacks has caused obvious damages throughout the network at individual, enterprise, and government level. Intrusion detection systems are one of the tools that detect and remedy the presence of malicious activities. Intrusion detection systems face many challen...
Conference Paper
Mobile Ad Hoc Networks are dynamic in nature and have no rigid or reliable network infrastructure by their very definition. They are expected to be self-governed and have dynamic wireless links which are not entirely reliable in terms of connectivity and security. Several factors could cause their degradation, such as attacks by malicious and selfi...
Article
The demand for information system authentication has significantly increased over the last decade. Research has shown that the majority of user authentications remain to be password based, however, it is well documented that passwords have significant limitations. To address this issue, companies have been placing increased requirements on the user...
Conference Paper
Modern firewalls are becoming complex and anomalies may exist in their rule sets. Security log data, such as firewall logs and logs generated by intrusion detection systems, could provide useful information for the update and addition of existing firewall rule sets. In this paper, we focus on the development of an effective mechanism for firewall r...
Article
Cloud computing is a fast growing field which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources on based on their payments. This paper discusses cloud computing and its related security risks, with a focus on access control. As a traditional access...
Article
This paper shows some experiences and observations on distance education in teaching a Computer Networks course for Computer Science masters students in an US institution. Some lessons and effective strategies to better engage students are presented. Data has been collected to show the effectiveness of distance education in teaching the course. Stu...
Conference Paper
Firewalls have been widely used in organizations to implement access control policies. However complicated management of firewall rule set has caused overheads and reduced the responsiveness of organizations. In this paper, we propose a solution for firewall rule management with a special aim at consistency check of firewall rules. We use Bloom fil...
Conference Paper
Attack graphs have been used to simulate attack scenarios to provide solutions for vulnerability analysis. However the scalability issue of attack graphs is still a big challenge. In this paper we present a detailed analysis on the scalability issue for attack graph. We also propose an approach to simplify attack graphs based on the similarity feat...
Conference Paper
A graph-based attack modeling technique is a formal approach for representing attack scenarios. One approach in this area is referred to as an exploitation graph (e-graph). This paper extends previous work on the e-graph approach by adding a function to efficiently insert new exploitations into the generated e-graph. The proposed algorithm has a ti...
Article
Full-text available
In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (e-graphs) that are used to represent attack scenarios...
Conference Paper
Full-text available
In this paper, we overview cluster security research underway at Mississippi State University (MSU) and focus on one particular effort involving a process to model system vulnerabilities and possible exploitations in specific cluster environments using exploitation graphs (e-graphs). Cluster security research at MSU has included attacks against clu...
Conference Paper
In this paper, we define a process to model and simulate attack scenarios in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are associated to create exploitation graphs (e-graphs) which are used to represent attack scenarios. Experiments carried out in a cluster computing enviro...
Conference Paper
In this paper, a modeling process is described to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are combined to create exploitation graphs (e-graphs), which are used to represent attack scenarios...
Conference Paper
Full-text available
As an emerging domain in high-performance computing, cluster computing is being widely used. However, there is little research work that comprehensively studies the security requirements in cluster-computing environments. Security mechanisms are important for cluster computing, especially when clusters are part of high-assurance systems. In this pa...
Article
Full-text available
This paper describes a technique of applying Genetic Algorithm (GA) to network Intrusion Detection Systems (IDSs). A brief overview of the Intrusion Detection System, genetic algorithm, and related detection techniques is presented. Parameters and evolution process for GA are discussed in detail. Unlike other implementations of the same problem, th...

Network

Cited By