Follow

Submissions from 2015

Link

Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali

Submissions from 2014

PDF

Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai

PDF

SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali

Link

Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai

Link

Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai

PDF

A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali

PDF

MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai

Link

Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei

Submissions from 2013

Link

Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali

Link

SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali

Submissions from 2012

Link

Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman

Submissions from 2010

Link

Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin

Submissions from 2009

Link

Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min

Link

Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin

Submissions from 2008

Link

SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin