Probabilistic techniques for intrusion detection based on computer audit data N Ye, X Li, Q Chen, SM Emran, M Xu IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001 | 362 | 2001 |
Security challenge and defense in VoIP infrastructures D Butcher, X Li, J Guo IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007 | 202 | 2007 |
Active affective state detection and user assistance with dynamic Bayesian networks X Li, Q Ji IEEE transactions on systems, man, and cybernetics-part a: systems and …, 2005 | 182 | 2005 |
A scalable clustering technique for intrusion signature recognition N Ye, X Li Proceedings of the 2001 IEEE workshop on information assurance and security, 5-6, 2001 | 112 | 2001 |
Association rule-generation algorithm for mining automotive warranty data J Buddhakulsomsiri, Y Siradeghyan, A Zakarian, X Li International journal of production research 44 (14), 2749-2770, 2006 | 105 | 2006 |
Selective packet inspection to detect DoS flooding using software defined networking (SDN) T Chin, X Mountrouidou, X Li, K Xiong 2015 IEEE 35th international conference on distributed computing systems …, 2015 | 96 | 2015 |
A supervised clustering and classification algorithm for mining data with mixed variables X Li, N Ye IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006 | 82 | 2006 |
Method for classifying data using clustering and classification algorithm supervised N Ye, X Li US Patent 6,907,436, 2005 | 80 | 2005 |
Decision tree classifiers for computer intrusion detection X Li, N Ye Real-time system security, 77-93, 2003 | 79 | 2003 |
A knowledge integration framework for complex network management X Li, C Chandra Industrial Management & Data Systems 107 (8), 1089-1109, 2007 | 74 | 2007 |
An SDN-supported collaborative approach for DDoS flooding detection and containment T Chin, X Mountrouidou, X Li, K Xiong MILCOM 2015-2015 IEEE Military Communications Conference, 659-664, 2015 | 61 | 2015 |
Statistical process control for computer intrusion detection N Ye, SM Emran, X Li, Q Chen Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 61 | 2001 |
A scalable, incremental learning algorithm for classification problems N Ye, X Li Computers & industrial engineering 43 (4), 677-692, 2002 | 52 | 2002 |
Grid‐and dummy‐cluster‐based learning of normal and intrusive clusters for computer intrusion detection X Li, N Ye Quality and Reliability Engineering International 18 (3), 231-242, 2002 | 38 | 2002 |
Decision tree for signature recognition and state classification N Ye IEEE Systems, Man, and Cybernetics Information Assurance and Security …, 2000 | 38 | 2000 |
Cybersecurity in liberal arts general education curriculum X Mountrouidou, X Li, Q Burke Proceedings of the 23rd Annual ACM Conference on Innovation and Technology …, 2018 | 25 | 2018 |
A supervised clustering algorithm for computer intrusion detection X Li, N Ye Knowledge and Information Systems 8, 498-509, 2005 | 24 | 2005 |
Cross-site scripting (XSS) detection integrating evidences in multiple stages J Zhang, YT Jou, X Li | 20 | 2019 |
Exploring cognitive modelling in engineering usability design X Li, M Gunal Journal of Engineering Design 23 (2), 77-97, 2012 | 20 | 2012 |
A machine learning algorithm based on supervised clustering and classification N Ye, X Li Active Media Technology: 6th International Computer Science Conference, AMT …, 2001 | 20 | 2001 |