Submissions from 2020
An Inventory of Existing Neuroprivacy Controls, Dustin Steinhagen and Houssain Kettani
Submissions from 2018
End-to-End Trust and Security for Internet of Things Applications, Sulabh Bhattarai and Yong Wang
An Optimized Running Window Entropy Algorithm, Keith Jones and Yong Wang
CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker
A Malware Analysis and Artifact Capture Tool, Dallas Wright and Josh Stroschein
Submissions from 2017
Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan
The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang
Submissions from 2016
Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky
A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang
An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu