Follow

Submissions from 2018

Link

End-to-End Trust and Security for Internet of Things Applications, Sulabh Bhattarai and Yong Wang

Link

CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker

Submissions from 2017

Link

Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan

Link

The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang

Submissions from 2016

Link

Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky

PDF

A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang

PDF

An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu