Follow

Submissions from 2024

PDF

Optimal Algorithm for Managing On-Campus Student Transportation, Youssef Harrath Dr.

PDF

An Algorithm Based on Priority Rules for Solving a Multi-drone Routing Problem in Hazardous Waste Collection, Youssef Harrath Dr. and Jihene Kaabi Dr.

PDF

Artificial Intelligence Usage and Data Privacy Discoveries within mHealth, Jennifer Schulte

Submissions from 2023

PDF

Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications, Zhao Gary Yu, Omar El-Gayar, and Tu Cindy Zhiling

Link

Verifying X.509 Certificate Extensions, Michael J. Ham, Cody Welu, and Kyle Cronin

Link

A Framework towards an efficient solution for the transportation of University of Bahrain Students, Youssef Harrath Dr.

PDF

Ant Colony-based Approach for solving an Unmanned Aerial Vehicle Routing Problem, Youssef Harrath Dr. and Jihene Kaabi Dr.

Link

Hybrid Quantum Artificial Intelligence Electromagnetic Spectrum Analysis Framework for Transportation System Security, Varghese Vaidyan

PDF

Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions, Yong Wang, Kaushik Ragothaman, Bhaskar P. Rimal Dr., and Mark Lawrence

Link

ICT: Attendance and Contact Tracing During a Pandemic, Shawn Zwach and Michael J. Ham

Submissions from 2022

Link

Recommender systems research and theory in higher education: A systematic literature review, Alicia McNett, and Cherie Noteboom

Link

Automated Post-Breach Penetration Testing through Reinforcement Learning, Austin O'Brien, Sujita Chaudhary, and Shengjie Xu

Link

IoT Device Identification Using Supervised Machine Learning, Yong Wang, Bhaskar P. Rimal Dr., Mark Elder, Sofía I. Crespo Maldonado, Helen Chen, Carson Koball, and Kaushik Ragothaman

PDF

Smart Electric Vehicle Charging in the Era of Internet of Vehicles, Emerging Trends, and Open Issues, Yong Wang, Bhaskar P. Rimal Dr., Cuiyu Kong, Bikrant Poudel, and Pratima Shahi

Link

Medical Device Security Regulations and Assessment Case Studies, Yong Wang, Kai Taylor, Alexandra Smith, Adam Zimmel, and Korina Alcantara

PDF

Design of a Virtual Cybersecurity Escape Room, Tania Williams and Omar El-Gayar

PDF

How Attractive is Artificial Intelligence? An Empirical Study of User Adoption of AI- Enabled Applications, Zhau, Gary; Omar El-Gayar; and Cindy Zhiling Tu

Submissions from 2021

PDF

BYOD security issues: a systematic literature review, Melva Ratchford, Omar El-Gayar, Cherie Noteboom, and Yong Wang

PDF

Adverse Health Effects of Kratom: An Analysis of Social Media Data, Abdullah Wahbeh, Tareq Nasralah, Omar El-Gayar, and Ahmed Elnoshokaty

Link

An Overview of Identity Relationship Management in the Internet of Things, Yong Wang and Mohammad Muntasir Nur

Link

A Systematic Mapping Study of Access Control in the Internet of Things, Yong Wang and Kaushik Ragothaman

Link

Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things Control in the Internet of Thing, Yong Wang, Kaushik Ragothaman, and Srinivasulu R. Vuggumudi

PDF

Security Analytics, Tania Williams, Thomas H. Morris, and Omar El-Gayar

Submissions from 2020

Link

Open Source Capture and Analysis of 802.11 Management Frames, Michael J. Ham and Kyle Cronin

Link

Alert Prioritization and Strengthening: Towards an Industry Standard Priority Scoring System for IDS Analysts Using Open Source Tools and Models of Machine Learning, Austin O'Brien, Bikram Dangi, Jeremy Gamet, Arica Kulm, T.J. Nelson, and Wayne E. Pauli

PDF

An Inventory of Existing Neuroprivacy Controls, Dustin Steinhagen and Houssain Kettani

Link

A Dynamic Analysis Security Testing Infrastructure for Internet of Things, Yong Wang, Elliot Kjerstad, and Bailey Belisario

Submissions from 2019

Link

CARVE: A Scientific Method-Based Threat Hunting Hypothesis Development Model, Yong Wang and Kevin Wafula

Submissions from 2018

Link

End-to-End Trust and Security for Internet of Things Applications, Sulabh Bhattarai and Yong Wang

Link

An Optimized Running Window Entropy Algorithm, Keith Jones and Yong Wang

Link

Using big data and network analysis to understand Wikipedia article quality, Jun Liu and Sudha Ram

Link

Geographic Variations and The Utilization of Health Care Resources, Tareq Nasralah, Cherie Noteboom, Abdullah Wahbeh, and Yong Wang

Link

CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker

Link

Towards improving the security of mobile systems using virtualization and isolation, Yong Wang and Jeremias Eppler

PDF

A Malware Analysis and Artifact Capture Tool, Dallas Wright and Josh Stroschein

Submissions from 2017

Link

Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan

Link

The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang

Submissions from 2016

Link

Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky

Link

You Look Suspicious!!: Leveraging Visible Attributes to Classify Malicious Short URLs on Twitter, Raj Kumar Nepali and Yong Wang

PDF

A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang

PDF

Mobile Payment Security, Threats, and Challenges, Yong Wang, Christen Hahn, and Kruttika Sutrave

PDF

An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu

Link

A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, Yong Wang and Jason Nikolai

Submissions from 2015

PDF

Detecting malicious short URLs on Twitter, Raj Kumar Nepali, Yong Wang, and Yazan Alshboul

PDF

An Automated Virtual Security Testing Platform for Android Mobile Apps, Yong Wang

PDF

Mobile Security Testing Approaches and Challenges, Yong Wang and Yazan Alshboul

Link

Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, Yong Wang, Santiago Gimenez Ocano, and Byrav Ramamurthy

Link

Privacy impact assessment for online social networks, Yong Wang and Raj Kumar Nepali

Link

Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali

Submissions from 2014

PDF

Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai

PDF

SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali

Link

Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai

Link

Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai

PDF

A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali

PDF

MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai

Link

Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei

Submissions from 2013

Link

Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali

Link

SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali

Submissions from 2012

Link

Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman

Submissions from 2010

Link

Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin

Submissions from 2009

Link

Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min

Link

Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin

Submissions from 2008

Link

SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin