The following publications are possibly variants of this publication:
- Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and ChallengesWenjuan Li, Yuxin Meng, Lam-for Kwok. ifip8-3 2013: 518-522 [doi]
- Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok. ifiptm 2014: 61-76 [doi]
- Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detectionWenjuan Li 0001, Fei Tian, Jin Li 0002, Yang Xiang 0001. concurrency, 34(16), 2022. [doi]
- Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management modelWenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip. jnca, 77:135-145, 2017. [doi]
- Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysisWenjuan Li, Lam-for Kwok. istr, 47:1-7, 2019. [doi]
- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion DetectionYuxin Meng, Wenjuan Li, Lam-for Kwok. NSS 2013: 40-53 [doi]
- SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok. GPC 2017: 402-415 [doi]
- Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok. fi, 10(1):6, 2018. [doi]