Follow
Xiangyang Li
Title
Cited by
Cited by
Year
Probabilistic techniques for intrusion detection based on computer audit data
N Ye, X Li, Q Chen, SM Emran, M Xu
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
3632001
Security challenge and defense in VoIP infrastructures
D Butcher, X Li, J Guo
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007
1962007
Active affective state detection and user assistance with dynamic Bayesian networks
X Li, Q Ji
IEEE transactions on systems, man, and cybernetics-part a: systems and …, 2004
1812004
A scalable clustering technique for intrusion signature recognition
N Ye, X Li
Proceedings of the 2001 IEEE workshop on information assurance and security, 5-6, 2001
1132001
Association rule-generation algorithm for mining automotive warranty data
J Buddhakulsomsiri, Y Siradeghyan, A Zakarian, X Li
International journal of production research 44 (14), 2749-2770, 2006
992006
Selective packet inspection to detect DoS flooding using software defined networking (SDN)
T Chin, X Mountrouidou, X Li, K Xiong
2015 IEEE 35th international conference on distributed computing systems …, 2015
932015
A supervised clustering and classification algorithm for mining data with mixed variables
X Li, N Ye
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
822006
Decision tree classifiers for computer intrusion detection
X Li, N Ye
Real-time system security, 77-93, 2003
802003
Method for classifying data using clustering and classification algorithm supervised
N Ye, X Li
US Patent 6,907,436, 2005
792005
A knowledge integration framework for complex network management
X Li, C Chandra
Industrial Management & Data Systems 107 (8), 1089-1109, 2007
712007
Statistical process control for computer intrusion detection
N Ye, SM Emran, X Li, Q Chen
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
612001
An SDN-supported collaborative approach for DDoS flooding detection and containment
T Chin, X Mountrouidou, X Li, K Xiong
MILCOM 2015-2015 IEEE Military Communications Conference, 659-664, 2015
552015
A scalable, incremental learning algorithm for classification problems
N Ye, X Li
Computers & industrial engineering 43 (4), 677-692, 2002
522002
Decision tree for signature recognition and state classification
N Ye
IEEE Systems, Man, and Cybernetics Information Assurance and Security …, 2000
402000
Grid‐and dummy‐cluster‐based learning of normal and intrusive clusters for computer intrusion detection
X Li, N Ye
Quality and Reliability Engineering International 18 (3), 231-242, 2002
372002
A supervised clustering algorithm for computer intrusion detection
X Li, N Ye
Knowledge and Information Systems 8, 498-509, 2005
242005
Cybersecurity in liberal arts general education curriculum
X Mountrouidou, X Li, Q Burke
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology …, 2018
222018
A machine learning algorithm based on supervised clustering and classification
N Ye, X Li
Active Media Technology: 6th International Computer Science Conference, AMT …, 2001
202001
Exploring cognitive modelling in engineering usability design
X Li, M Gunal
Journal of Engineering Design 23 (2), 77-97, 2012
192012
Application of decision tree classifiers to computer intrusion detection
N Ye, X Li
WIT Transactions on Information and Communication Technologies 25, 2000
192000
The system can't perform the operation now. Try again later.
Articles 1–20