The following publications are possibly variants of this publication:
- Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysisWenjuan Li, Lam-for Kwok. istr, 47:1-7, 2019. [doi]
- Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion DetectionYuxin Meng, Wenjuan Li, Lam-for Kwok. hpcc 2013: 175-182 [doi]
- Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detectionWeizhi Meng, Wenjuan Li, Lam-for Kwok. scn, 8(18):3883-3895, 2015. [doi]
- Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion DetectionYuxin Meng, Lam-for Kwok, Wenjuan Li. securecomm 2013: 203-221 [doi]
- Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok. ifiptm 2014: 61-76 [doi]