Submissions from 2024
Getting the Best Out of Joint Warfighter Development, Charls Davis, Jeffrey Turner, and Mary Bell
Optimal Algorithm for Managing On-Campus Student Transportation, Youssef Harrath Dr.
An Algorithm Based on Priority Rules for Solving a Multi-drone Routing Problem in Hazardous Waste Collection, Youssef Harrath Dr. and Jihene Kaabi Dr.
The Trajectory of Romance Scams in the U.S, LD Herrera and John Hastings
The Trajectory of Romance Scams in the U.S., LD Herrera and John Hastings
Towards Robust IoT Security: A Blockchain Design with Attribute-based Encryption, Bryan Ikei, Hanna Thiry, and Shengjie Xu
Test Suite Optimization Using Machine Learning Techniques: A Comprehensive Study, Abid Mehmood, Qazi Mudassir Ilyas, Muneer Ahmad, and Zhongliang Shi
Artificial Intelligence Usage and Data Privacy Discoveries within mHealth, Jennifer Schulte
Toward Automated Knowledge Discovery in Case-Based Reasoning, Sherri Weitl-Harms, John Hastings, and Jay H. Powell
Submissions from 2023
Verifying X.509 Certificate Extensions, Michael J. Ham, Cody Welu, and Kyle Cronin
A Framework towards an efficient solution for the transportation of University of Bahrain Students, Youssef Harrath Dr.
Ant Colony-based Approach for solving an Unmanned Aerial Vehicle Routing Problem, Youssef Harrath Dr. and Jihene Kaabi Dr.
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITERATURE REVIEW, T.J. Nelson, Austin O'Brien, and Cherie Noteboom
Web Injection and Banking Trojan Malware -A Systematic Literature Review, Cherie Noteboom, Tjada Nelson, and Cory A. Nance
Hybrid Quantum Artificial Intelligence Electromagnetic Spectrum Analysis Framework for Transportation System Security, Varghese Vaidyan
Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions, Yong Wang, Kaushik Ragothaman, Bhaskar P. Rimal Dr., and Mark Lawrence
ICT: Attendance and Contact Tracing During a Pandemic, Shawn Zwach and Michael J. Ham
Submissions from 2022
Recommender systems research and theory in higher education: A systematic literature review, Alicia McNett, and Cherie Noteboom
Automated Post-Breach Penetration Testing through Reinforcement Learning, Austin O'Brien, Sujita Chaudhary, and Shengjie Xu
IoT Device Identification Using Supervised Machine Learning, Yong Wang, Bhaskar P. Rimal Dr., Mark Elder, Sofía I. Crespo Maldonado, Helen Chen, Carson Koball, and Kaushik Ragothaman
Smart Electric Vehicle Charging in the Era of Internet of Vehicles, Emerging Trends, and Open Issues, Yong Wang, Bhaskar P. Rimal Dr., Cuiyu Kong, Bikrant Poudel, and Pratima Shahi
Medical Device Security Regulations and Assessment Case Studies, Yong Wang, Kai Taylor, Alexandra Smith, Adam Zimmel, and Korina Alcantara
Submissions from 2021
BYOD security issues: a systematic literature review, Melva Ratchford, Omar El-Gayar, Cherie Noteboom, and Yong Wang
An Overview of Identity Relationship Management in the Internet of Things, Yong Wang and Mohammad Muntasir Nur
A Systematic Mapping Study of Access Control in the Internet of Things, Yong Wang and Kaushik Ragothaman
Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things Control in the Internet of Thing, Yong Wang, Kaushik Ragothaman, and Srinivasulu R. Vuggumudi
Submissions from 2020
Open Source Capture and Analysis of 802.11 Management Frames, Michael J. Ham and Kyle Cronin
Alert Prioritization and Strengthening: Towards an Industry Standard Priority Scoring System for IDS Analysts Using Open Source Tools and Models of Machine Learning, Austin O'Brien, Bikram Dangi, Jeremy Gamet, Arica Kulm, T.J. Nelson, and Wayne E. Pauli
An Inventory of Existing Neuroprivacy Controls, Dustin Steinhagen and Houssain Kettani
A Dynamic Analysis Security Testing Infrastructure for Internet of Things, Yong Wang, Elliot Kjerstad, and Bailey Belisario
Submissions from 2019
CARVE: A Scientific Method-Based Threat Hunting Hypothesis Development Model, Yong Wang and Kevin Wafula
Submissions from 2018
End-to-End Trust and Security for Internet of Things Applications, Sulabh Bhattarai and Yong Wang
An Optimized Running Window Entropy Algorithm, Keith Jones and Yong Wang
Geographic Variations and The Utilization of Health Care Resources, Tareq Nasralah, Cherie Noteboom, Abdullah Wahbeh, and Yong Wang
CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker
Towards improving the security of mobile systems using virtualization and isolation, Yong Wang and Jeremias Eppler
A Malware Analysis and Artifact Capture Tool, Dallas Wright and Josh Stroschein
Submissions from 2017
Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan
The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang
Submissions from 2016
Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky
You Look Suspicious!!: Leveraging Visible Attributes to Classify Malicious Short URLs on Twitter, Raj Kumar Nepali and Yong Wang
A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang
Mobile Payment Security, Threats, and Challenges, Yong Wang, Christen Hahn, and Kruttika Sutrave
An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu
A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, Yong Wang and Jason Nikolai
Submissions from 2015
Detecting malicious short URLs on Twitter, Raj Kumar Nepali, Yong Wang, and Yazan Alshboul
An Automated Virtual Security Testing Platform for Android Mobile Apps, Yong Wang
Mobile Security Testing Approaches and Challenges, Yong Wang and Yazan Alshboul
Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, Yong Wang, Santiago Gimenez Ocano, and Byrav Ramamurthy
Privacy impact assessment for online social networks, Yong Wang and Raj Kumar Nepali
Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali
Submissions from 2014
Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai
SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali
Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai
Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai
A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali
MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai
Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei
Submissions from 2013
Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali
SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali
Submissions from 2012
Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman
Submissions from 2010
Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin
Submissions from 2009
Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin
Submissions from 2008
SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin