Submissions from 2018
CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker
Towards improving the security of mobile systems using virtualization and isolation, Yong Wang and Jeremias Eppler
A Malware Analysis and Artifact Capture Tool, Dallas Wright and Josh Stroschein
Submissions from 2017
Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan
The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang
Submissions from 2016
Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky
You Look Suspicious!!: Leveraging Visible Attributes to Classify Malicious Short URLs on Twitter, Raj Kumar Nepali and Yong Wang
A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang
Mobile Payment Security, Threats, and Challenges, Yong Wang, Christen Hahn, and Kruttika Sutrave
An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu
A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, Yong Wang and Jason Nikolai
Submissions from 2015
Detecting malicious short URLs on Twitter, Raj Kumar Nepali, Yong Wang, and Yazan Alshboul
An Automated Virtual Security Testing Platform for Android Mobile Apps, Yong Wang
Mobile Security Testing Approaches and Challenges, Yong Wang and Yazan Alshboul
Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, Yong Wang, Santiago Gimenez Ocano, and Byrav Ramamurthy
Privacy impact assessment for online social networks, Yong Wang and Raj Kumar Nepali
Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali
Submissions from 2014
Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai
SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali
Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai
Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai
A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali
MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai
Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei
Submissions from 2013
Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali
SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali
Submissions from 2012
Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman
Submissions from 2010
Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin
Submissions from 2009
Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin
Submissions from 2008
SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin