Follow

Submissions from 2018

Link

CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker

Link

Towards improving the security of mobile systems using virtualization and isolation, Yong Wang and Jeremias Eppler

PDF

A Malware Analysis and Artifact Capture Tool, Dallas Wright and Josh Stroschein

Submissions from 2017

Link

Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan

Link

The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang

Submissions from 2016

Link

Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky

Link

You Look Suspicious!!: Leveraging Visible Attributes to Classify Malicious Short URLs on Twitter, Raj Kumar Nepali and Yong Wang

PDF

A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang

PDF

Mobile Payment Security, Threats, and Challenges, Yong Wang, Christen Hahn, and Kruttika Sutrave

PDF

An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu

Link

A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, Yong Wang and Jason Nikolai

Submissions from 2015

PDF

Detecting malicious short URLs on Twitter, Raj Kumar Nepali, Yong Wang, and Yazan Alshboul

PDF

An Automated Virtual Security Testing Platform for Android Mobile Apps, Yong Wang

PDF

Mobile Security Testing Approaches and Challenges, Yong Wang and Yazan Alshboul

Link

Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, Yong Wang, Santiago Gimenez Ocano, and Byrav Ramamurthy

Link

Privacy impact assessment for online social networks, Yong Wang and Raj Kumar Nepali

Link

Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali

Submissions from 2014

PDF

Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai

PDF

SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali

Link

Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai

Link

Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai

PDF

A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali

PDF

MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai

Link

Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei

Submissions from 2013

Link

Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali

Link

SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali

Submissions from 2012

Link

Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman

Submissions from 2010

Link

Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin

Submissions from 2009

Link

Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min

Link

Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin

Submissions from 2008

Link

SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin