Y. Zhang, T. Deb, M. Jeong, A. Pugliese, C. Molinaro, V.S. Subrahmanian, and S. J. Yang, “DUCK: A Drone-Urban Cyber-Defense Framework based on Pareto-Optimal Deontic Logic Agents,” Demo Paper for AAAI-23, February 7-14, 2023, Washington DC, USA.
C. Chen and S. J. Yang, “Cross-Organizational Continual Learning of Cyber Threat Models,” Poster Paper, ACSAC 2022, December 7-9, 2022, Austin TX, USA.
R. Fayyazi, Y. S. Wufeng, P. Gautam, and S. J. Yang, “Translating Cybersecurity Descriptions into Interpretable MITRE Tactics using Transfer Learning,” Poster Paper, ACSAC 2022, December 7-9, 2022, Austin TX, USA.
I. Totino, T. Sutton, and S. J. Yang, “The Role of Curiosity in Cybersecurity Practitioner Behavior and Performance,” Poster in Psychonomic Society 63rd Annual Meeting, November 17-20, 2022, Boston, Massachusetts, USA.
H. Peng, H. Rahbari, L.-C. Wang, S. J. Yang, “Non-cooperative Learning for Robust Spectrum Sharing in Connected Vehicles with Malicious Agents,” in Proceedings of IEEE GLOBECOM, December 4-8, 2022, Rio de Janeiro, Brazil.
G. Werner and S. J. Yang, “Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams,” in Proceedings of IEEE ICCCN 2022, July 25-28, 2022.
A. Nadeem, S. Verwer, S. Moskal, and S. J. Yang, “Poster: Enabling Visual Analytics via Alert-driven Attack Graphs,” Poster in ACM CCS 2021, November 15-19, 2021.
G. Werner and S. J. Yang, “CLEAR-ROAD: Extraction of Temporally Co-occurring yet Rare Critical Alerts,” in Proceedings of Conference on Applied Machine Learning in Information Security (CAMLIS), Arlington VA, Nov 4-5, 2021.
S. Moskal and S. J. Yang, “Heated Alert Triage (HeAT): Network-Agnostic Extraction of Cyber Attack Campaigns,” in Proceedings (short paper) of Conference on Applied Machine Learning in Information Security (CAMLIS), Arlington VA, Nov 4-5, 2021.
S. Moskal and S. J. Yang, “Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning,” in Proceedings of IEEE Conferences on Communications and Network Security, Oct 4-6, 2021.
A. Nadeem, S. Verwer, S. Moskal, and S. J. Yang, “Alert-driven Attack Graph Generation using S-PDFA,” in IEEE Transactions on Dependable and Secure Computing, 2021, doi: 10.1109/TDSC.2021.3117348.
A. Nadeem, S. Verwer, S. Moskal, and S. J. Yang, “SAGE: Intrusion Alert-driven Attack Graph Extractor,” Short Paper in the Proceedings of VizSec 2021, co-located with IEEE VIS, October 27, 2021.
A. Corsini, S. J. Yang, and G. Apruzzese, “On the Evaluation of Sequential Learning Models for Malicious NetFlow Detection,” in Proceedings of NG-SOC 2021 Workshop, co-located with the 16 th International Conference on Availability, Reliability, and Security (ARES), August 17-20, 2021.
G. Werner and S. J. Yang, “Alert Correlation Mining from Temporal Attack Behaviors,” student poster presentation in KDD Workshop on AI-enabled Cybersecurity Analytics, August 14-18, 2021, https://ai4cyber-kdd.com/
A. Nadeem, S. Verwer, S. Moskal, and S. J. Yang, “SAGE: Intrusion Alert-driven Attack Graph Extractor,” student full presentation in KDD Workshop on AI-enabled Cybersecurity Analytics, August 14-18, 2021, https://ai4cyber-kdd.com/.
G. Werner, S. J. Yang, and K. McConky, “Near Real-time Intrusion Alert Aggregation Using Concept-based Learning,” in Proceedings of ACM International Conference on Computing Frontiers, 2021.
M. Husák, G. Apruzzese, S. J. Yang, and G. Werner, “Towards an Efficient Detection of Pivoting Activity,” in Proceedings of International Workshop on Graph-based network Security (GraSec), in conjunction with IFIP/IEEE International Symposium on Integrated Network Management, May 2021.
A. Krall, M. E. Kuhl, and S. J. Yang, “Estimation of Cyber Network Risk using Rare-Event Simulation,” Journal of Defense Modeling and Simulation, June 2020, doi:10.1177/1548512920934551.
A. Okutan, S. J. Yang, and K. McConky, “Cyberattack Forecasting Using Predictive Information,” Non-provisional Patent US20210021631A1, application filed June 11, 2020.
C. Sweet, S. Moskal, and S. J. Yang, “On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks,” ACM Transactions on Management Information Systems, Special Issue on Analytics for Cybersecurity and Privacy, Vol.11, Issue 4, No. 22, December 2020, https://dl.acm.org/doi/abs/10.1145/3394503.
A. Okutan and S. J. Yang, “ASSERT: Attack Synthesis and Separation with Entropy Redistribution towards Predictive Cyber Defense”, Springer Journal on Cybersecurity, 2:15, May 2019.
A. Okutan, G. Werner, S. J. Yang, and K. McConky, “Forecasting Cyberattacks with Incomplete, Imbalanced, and Insignificant Data,” Springer Journal on Cybersecurity, 1:15, December 2018.
S. Moskal, S. J. Yang, and M. Kuhl, “Cyber Threat Assessment via Attack Scenario Simulation using an Integrated Adversary and Network Modeling Approach,” Journal of Defense Modeling and Simulation, Vol. 15, No.1, pp.13-29, 2018.
J. Holsopple, S. J. Yang, and M. Sudit, “Mission Impact Assessment for Cyber Warfare,” book chapter in R. R. Yager, M. Z. Reformat, and N. Alajlan (Eds.), Intelligent Methods for Cyber Warfare, Springer, pp. 239-266, 2015.
H. Du, C. Wang, T. Zhang, S. J. Yang, J. Choi, and P. Liu, “Cyber Insider Mission Detection for Situation Awareness,” book chapter in R. R. Yager, M. Z. Reformat, and N. Alajlan (Eds.), Intelligent Methods for Cyber Warfare, Springer, pp. 201-218, 2015.
J. Holsopple, M. Sudit, and S. J. Yang, “Top-down Driven Cyber Impact Assessment,” book chapter in A. Kott, R. Erbacher, and C. Wang (Eds.), Cyber Defense and Situational Awareness, Springer, pp. 219-238, 2014.
S. J. Yang, H. Du, J. Holsopple, and M. Sudit, “Attack Projection for Predictive Cyber Situation Awareness,” book chapter in A. Kott, R. Erbacher, and C. Wang (Eds.), Cyber Defense and Situational Awareness, Springer, pp. 239-261, 2014.
H. Du and S. J. Yang, “Temporal and Spatial Analyses of Large Scale Cyber Attacks,” in Subrahmanian, V.S. (Ed.), Handbook of Computational Approaches to Counterterrorism, Springer, pp.559-578, 2013.
J. Holsopple, M. Nusinov, D. F. Liu, H. Du, S. J. Yang, and M. Sudit, “Enhancing Situation Awareness via Automated Situation Assessment,” IEEE Communication Magazine, March 2010.
S. J. Yang, A. Stotz, J. Holsopple, M. Sudit, and M. Kuhl, “High Level Information Fusion for Tracking and Projection of Multistage Cyber Attacks,” Elsevier International Journal on Information Fusion, Vol. 10, No. 1, pp.107-121, January 2009.
D. Fava, S. Byers, S. J. Yang, “Projecting Cyber Attacks through Variable Length Markov Models,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, September 2008.
S. J. Yang and M. Sudit, “The Effect of Multi-mode Operations to Routing and Scheduling on Wireless Sensor Networks,” in McGraw-Hill Handbook of Wireless Mesh and Sensor Networking, 2007.
S. J. Yang and G. de Veciana, “Enhancing both Network and User Performance for Networks Supporting Best Effort Networks,” IEEE/ACM Transaction on Networking, Vol.12, No.2, p.349-360, April 2004.
S. J. Yang, A. Okutan, G. Werner, A. Goel, S. Su, and N. Cahill, “Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts,” https://arxiv.org/abs/2103.13902.
S. Moskal and S. J. Yang, “Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning,” WiP paper, ACSAC, December 2020.
B. Quinn, S. J. Yang, M Wright, and B. Yuan, “Learning and Generating Cyber Attack Netflows Using Generative Adversarial Networks,” WiP paper, ACSAC, December 2020.
S. Moskal and S. J. Yang, “Cyberattack Action-Intent-Framework for Mapping Intrusion Observables,” arXiv:2002.07838 [cs.CR].
S. Moskal and S. J. Yang, “Cyber-Adversary Behavior Extraction and Comparisons Using IDS Alert Logs,” Poster in CAMLIS 2019, Washington DC, USA.
C. Sweet, S. Moskal, and S. J. Yang, “On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks,” arXiv:1908.01219 [cs.LG].
H. Du and S. J. Yang, “Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences,” arXiv:1809.01562 [cs.CR].
A. Okutan, S. J. Yang, and K. McConky, “Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities,” arXiv:1803.09560 [cs.CR].
N. Munaiah, J. Pelletier, S.-H. Su, S. J. Yang, and A. Meneely, “Cybersecurity Dataset Derived from the National Collegiate Penetration Testing Competition,” in Proceedings of Hawaii International Conference on System Sciences (HICSS) (short paper), January 8-11, 2019, Maui, Hawaii USA.
A. Okutan, G. Werner, K. McConky, and S. J. Yang, “Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE),” in Proceedings of ACM Conference on Computer and Communications Security (poster paper), Oct 30-Nov 3, 2017, Dallas, TX USA.
S. Moskal and S. J. Yang, “Knowledge Based Decision Making for Simulating Cyber Attack,” Military Operations Research Society (MORS) Emerging Techniques Special Meeting, December 6-7, 2016, Alexandria, VA, USA.
S. Moskal, I. Perry, M. E. Kuhl, and S. J. Yang, “CASCADES: Modeling and Simulation of Cyber Attacker Behaviors for Network Threat Analysis,” Poster in 2016 Annual Computer Security Applications Conference (ACSAC), December 5-9, 2016, Los Angeles, CA, USA.
N. Wong Hon Chan and S. J. Yang, “SCANNER: Sequence Clustering of Android Resource Accesses,” Poster in 2016 Annual Computer Security Applications Conference (ACSAC), December 5-9, 2016, Los Angeles, CA, USA.
B. Cui, S. J. Yang, and C. Homan, “Non-independent Cascade Formation: Temporal and Spatial Effects,” in Proceedings of ACM International Conference on Information and Knowledge Management (CIKM’14), (Poster Paper) Shanghai, China, November 3-7, 2014.
R.-G. Cheng, C.-L. Lian, P.-C. Lin, P.Y. Tsai, T.-H. Liu, H.-C. Chou, S.-L. Tsao, and S. J. Yang, “Design and Implementation of a Skype Protocol Analyzer,” in Proceedings of IEEE Conference on Communications and Network Security (Poster Paper), Oct 14-15, 2013, Washington DC, USA.
S. Moskal, D. Kreider, L. Hays, B. Wheeler, S. J. Yang, and M. Kuhl, “Simulating Attack Behaviors in Enterprise Networks,” in Proceedings of IEEE Conference on Communications and Network Security (Poster Paper), Oct 14-15, 2013, Washington DC, USA.
H. Du and S. J. Yang, “Sequential Modeling for Obfuscated Network Attack Action Sequences,” in Proceedings of IEEE Conference on Communications and Network Security (Poster Paper), Oct 14-15, 2013, Washington DC, USA.
B. Cui, S. Moskal, H. Du, and S. J. Yang, “Who Shall We Follow in Twitter for Cyber Vulnerability?” in Proceedings of 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP13) (Poster Paper), April 2-5, 2013, Washington, DC.
N. Ransom and S. J. Yang, “Multithreat Containment with Wireless Neighborhoods,” in Proceedings of IEEE Upstate NY Workshop on Sensors, Communications, and Networking ’07 (Poster Paper), Syracuse NY, November 9, 2007.
K. Chung-Chung-Wai and S. J. Yang, “Benchmarking of Reed-Solomon Error Correcting Codes on Reconfigurable Devices,” in Proceedings of 2nd IEEE Upstate NY Workshop on Communications and Networking (Poster Paper), Rochester, NY, November, 2005.
M. Seidman and S. J. Yang, “Collision Avoidance for Autonomous Robot Team Formation,” in Proceedings of 2nd IEEE Upstate NY Workshop on Communications and Networking (Poster Paper), Rochester, NY., November, 2005.
J. Yerdon, S. J. Yang, and N. Shenoy, “Probabilistic Flooding for Wireless Ad Hoc Relay Networks,” in Proceedings of 2nd IEEE Upstate NY Workshop on Communications and Networking (Poster Paper), Rochester, NY, November, 2005.
S. Maeung, S. J. Yang, and N. Shenoy, “Modeling and Simulation of Gossip-Based Relayed Network for Ubiquitous and Expanded Access,” in online Proceedings of OPNETWORK ’04, Washington, D.C., August 30 - September 3, 2004.
N. Krishnamurthi, S. J. Yang and Mark Seidman, “Modular Topology Control and Energy Model for Wirless Ad Hoc Sensor Networks,” in online Proceedings of OPNETWORK ’04, Washington, D.C., August 30 - September 3, 2004.
C. Cress, S. J. Yang, and M. Sudit, “Using an ON/OFF Scheme for networked Sensors – Is it Really Beneficial?” Second IEEE Upstate New York Workshop on Sensor Networks (Poster Paper), Syracuse University, NY, 10/10/03.
M. Drasar, S. Moskal, S. J. Yang, and P. Zaťko, “Session-level Adversary Intent-Driven Cyberattack Simulator,” in Proceedings of IEEE/ACM DS-RT 2020, Prague, Czech Republic, September 14-16, 2020.
M. Husák, T. Jirsik, and S. J. Yang, “SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security,” in Proceedings of 2020 International Conference on Availability, Reliability and Security (ARES), August 25-28, 2020.
A. Rege, S. J. Yang, A. Mendlein, K. Williams, S.-H. Su, and S. Moskal, “Dissecting Cyber-adversarial Intrusion Stages via Interdisciplinary Observations,” in Proceedings of the 6th ACM International Workshop on Security and Privacy Analytics, co-located with ACM Codaspy, March 18, 2020, New Orleans, LA, USA.
A. Okutan, F.-Y. Cheng, S.-H. Su, and S. J. Yang, “Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features,” in Proceedings of IEEE MILCOM, 2019, USA.
C. Sweet, S. Moskal, and S. J. Yang, “Synthetic Intrusion Alert Generation through Generative Adversarial Networks,” in Proceedings of IEEE MILCOM, 2019, USA.
A. Okutan, S. J. Yang, K. McConky, and G. Werner, “CAPTURE: Cyberattack Forecasting using Non-Stationary Features with Time Lags,” in Proceedings of IEEE Conference on Communications and Network Security (CNS), June 10-12, 2019, Washington, D.C. USA.
C.-Y. Huang, C.-W. Lin, R.-G. Cheng, S. J. Yang, and S.-T. Sheu, “Experimental Evaluation of Jamming Threat in LoRaWAN,” in Proceedings of IEEE Vehicular Technology Conference, April 28 – May 1, 2019, Kuala Lumpur, Malaysia.
I. Perry, L. Li, C. Sweet, S.-H. Su, and F.-Y. Cheng, S. J. Yang, and A. Okutan, “Differentiating and Predicting Cyberattacks using LSTM,” in Proceedings of IEEE International Conference on Dependable and Secure Computing (DSC), December 10-13, 2018, Kaohsiung, Taiwan.
G. Werner, S. J. Yang, and K. McConky, “Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity,” in Proceedings of IEEE Intelligence and Security Informatics (ISI), November 8-10, 2018, Miami FL.
S. Moskal and S. J. Yang, “Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts,” in Proceedings of IEEE Intelligence and Security Informatics (ISI), November 8-10, 2018, Miami FL.
G. Werner, A. Okutan, S. J. Yang, and K. McConky, “Forecasting Cyberattacks as Timeseries with Different Aggregation Granularity,” in Proceedings of IEEE International Symposium on Technologies for Homeland Security (HST), October 23 - 24, 2018 Woburn, MA USA.
S. J. Yang, A. Rege, and M. E. Kuhl, “Learning, Simulating and Predicting Adversary Attack Behaviors for Proactive Cyber Defense,” in Proceedings of NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience, pp. 30-34, October 18-20, 2017, Prague, Czech Republic.
N. Wong Hon Chan and S. J. Yang, “SCANNER: Sequence Clustering of Android Resource Accesses,” in Proceedings of IEEE Conference on Dependable and Secure Computing, August 7-10, 2017, Taipei, Taiwan.
B. Cui, S. J. Yang, and C. Homan, “Modeling Information Sharing Behavior on Q&A Forums,” in Proceedings of The Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), May 23-26, 2017, Jeju, South Korea.
G. Werner, S. J. Yang, and Katie McConky, “Time Series Forecasting of Cyber Attack Intensity,” in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ACM, April 4-6, 2017, Oak Ridge, Tennessee, USA.
A. Okutan, S. J. Yang, and Katie McConky, “Predicting Cyber Attacks with Bayesian Networks using Unconventional Signals,” in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ACM, April 4-6, 2017, Oak Ridge, Tennessee, USA.
A. Krall, M. E. Kuhl, S. J. Yang, and S. Moskal, “Estimating the Likelihood of Cyber Attack Penetration using Rare-Event Simulation,” in Proceedings of 2016 IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016), December 6-9, Athens, Greece.
E. Blasch, I. Kadar, C.-Y. Chong, A. Steinberg, R. P. S. Mahler, S. J. Yang, L. H. Fenstermacher, A. L. Chan, P. Tandy, “Issues and Challenges of the Applications of Context to Enhance Information Fusion, Panel Summary,” in Proceedings of SPIE 9842, Signal Processing, Sensor/Information Fusion, and Target Recognition XXV, May 19, 2016.
L. Zhao, N. Wong Hon Chan, S. J. Yang, R. W. Melton, "Privacy Sensitive Resource Access Monitoring for Android Systems,” in Proceedings of the 5th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2015), in conjunction with IEEE ICCCN 2015, August 3-6, 2015, Las Vegas, Nevada, USA.
B. Cui and S. J. Yang, “NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks,” in Proceedings of IEEE Conference on Communications and Network Security (CNS’14), San Francisco, CA, Oct 29-31, 2014.
S. Moskal, B. Wheeler, D. Kreider, M. E. Kuhl, and S. J. Yang, “Context Model Fusion for Multistage Network Attack Simulation,” in Proceedings of IEEE Military Communications Conference (MILCOM’14), Baltimore, MD, October 6-8, 2014.
H. Du and S. J. Yang, “Probabilistic Inference for Obfuscated Network Attack Sequences,” in Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’14), Atlanta, GA, June 23-26, 2014.
R. Melton, S. J. Yang, and A. Becker-Gomez, “Engaging Computer Engineering Freshmen through a Voluntary Competitive Team Project with Mentoring,” in Proceedings of ASEE Annual Conference & Exposition, June 15-18, 2014, Indianapolis, IN.
S. Strapp and S. J. Yang, “Segmenting large-scale cyber attacks for online behavior model generation,” in Proceedings of 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14), April 1-4, 2014, Washington, DC.
B. Cui and S. J. Yang, “Who Will Follow a New Topic Tomorrow?” in Proceedings of 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14), April 1-4, 2014, Washington, DC.
B. Cui, S. J. Yang, and I. Kadar, “Influence versus Intent for Predictive Analytics in Situation Awareness,” in Proceedings of SPIE Defense and Security Symposium, Vol. 8745, Baltimore, Maryland, April 29-May3, 2013.
E. Blasch, J. Salerno, I. Kadar, S. J. Yang, L. Fenstermacher, M. Endsley, and L. Grewe, “Summary of human social, cultural, behavioral (HSCB) modeling for information fusion panel discussion,” in Proceedings of SPIE Defense and Security Symposium, Signal Processing, Sensor Fusion, and Target Recognition XXII, Vol. 8745, Baltimore, Maryland, April 29-May 3, 2013.
H. Du and S. J. Yang, “Characterizing Transition Behaviors in Internet Attack Sequences,” in Proceedings of IEEE ICCCN’11, Maui, USA, August 1-4, 2011.
H. Du and S. J. Yang, “Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis,” in Proceedings of 2011 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP11), University of Maryland College Park, MD, Mach 29-31, 2011.
H. Du, D. Liu, J. Holsopple, and S. J. Yang, “Toward Ensemble Characterization and Projection of Multistage Cyber Attacks,” in Proceedings of IEEE ICCCN’10, Zurich, Switzerland, August 2-5, 2010.
M. Nusinov, S. J. Yang, J. Holsopple, and M Sudit, “ViSAw: Visualizing threat and impact assessment for enhanced situation awareness,” in Proceedings of IEEE Military Communications Conference (MILCOM’09), Boston, MA, October 2009.
2J. Holsopple and S. J. Yang, “Designing a Data Fusion System using a Top-down Approach,” in Proceedings of IEEE Military Communications Conference (MILCOM’09), Boston, MA, October 2009.
S. J. Yang, J. Holsopple, and D. Liu, “Elements of impact assessment: a case study with cyber attacks,” in Proceedings of SPIE Defense, Security, and Sensing Symposium, Intelligent Sensing, Situation Management, Impact Assessment, and Cyber-Sensing Conference, Vol. 7352, Orlando, Florida, April 13-17, 2009.
A. Weissman, A. Frazier, M. Pepen, Y.-W. Lu, and S. J. Yang, “Cyber integrated MEMS microhand for biological applications,” in Proceedings of SPIE Defense, Security, and Sensing Symposium, Micro- and Nanotechnology Sensors, Systems, and Applications, Vol. 7318, Orlando, Florida, April 13-17, 2009.
V. Hannak, A. Savakis, S. J. Yang, and P. Anderson, “Concurrent evolution of feature extractors and modular artificial neural networks,” in Proceedings of SPIE Defense, Security, and Sensing Symposium, Evolutionary and Bio-Inspired Computation: Theory and Applications III, Vol. 7347, Orlando, Florida, April 13-17, 2009.
J. Holsopple and S. J. Yang, “FuSIA: Future Situation and Impact Awareness,” in Proceedings of the 11th ISIF/IEEE International Conference on Information Fusion, Cologne, Germany, July 1-3, 2008.
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, and D. Fava, “Intrusion Activity Projection for Cyber Situational Awareness,” in Proceedings of IEEE International Conferences on Intelligence and Security Informatics, Taipei, Taiwan, June 17-20, 2008.
N. Ransom and S. J. Yang, “Multi-threat containment with wireless dynamic neighborhood networks,” in Proceedings of SPIE Security and Defense Symposium, Intelligent Computing: Theory and Applications VI Conference, Orlando, FL, March 16-20, 2008.
G. Hendry and S. J. Yang, “Intrusion signature creation via clustering anomalies,” in Proceedings of SPIE Security and Defense Symposium, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security Conference, Vol. 6973, Orlando, FL, March 16-20, 2008.
J. Holsopple, B. Argauer, and S. J. Yang, “Virtual terrain: a common representation of a computer network,” in Proceedings of SPIE Security and Defense Symposium, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security Conference, Vol. 6973, Orlando, FL, March 16-20, 2008.
B. Argauer and S. J. Yang, “VTAC: virtual terrain assisted impact assessment for cyber attacks,” in Proceedings of SPIE Security and Defense Symposium, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security Conference, Vol. 6973, Orlando, FL, March 16-20, 2008.
N. Krishnamurthi and S. J. Yang, “Feasibility and Performance Analysis of Sensor Modeling in OPNET,” in Proceedings of OPNETWORK ‘07 (Outstanding Technical Paper Award), Washington, D.C., August 27-31, 2007.
D. Fava, J. Holsopple, S. J. Yang, and B. Argauer, “Terrain and Behavior Modeling for Projecting Multistage Cyber Attacks,” in Proceedings of the ISIF/IEEE 10th International on Information Fusion, Quebec City, Canada, July 9-12, 2007.
B. Mehendale and S. J. Yang, “Potential Field Based Approach for Multi-threat Containment with Cooperative Robots,” in Proceedings of the 4th International Conference on Cybernetics and Information Technologies, Systems and Applications, Orlando FL, July 12-15, 2007.
S. Sail and S. J. Yang, “On the Applicability of Random Mobility Models for Swarm Robot Movements,” in Proceedings of the 4th International Conference on Cybernetics and Information Technologies, Systems and Applications, Orlando FL, July 12-15, 2007.
M. Seidman and S. J. Yang, “The Effect of Collision Avoidance for Autonomous Robot Team Formation,” in Proceedings of SPIE Defense and Security Symposium, Unmanned Systems Technology IX Conference, Vol. 6561, Orlando FL, April 9-12, 2007.
S. J. Yang, J. Holsopple, and M. Sudit, “Evaluating Threat Assessment for Multi-stage Cyber Attacks,” in Proceedings of 2nd IEEE Workshop on Situation Management (SIMA), collocated with IEEE MILCOM, Washington, D.C., October 23-25, 2006.
J. Holsopple, S. J. Yang, and M. Sudit, “TANDI: Threat Assessment for Network Data and Information,” in Proceedings of SPIE Security and Defense Symposium, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications Conference, Vol. 6242, Orland FL, April 17-21, 2006.
S. J. Yang, N. Krishnamurthi, C. Cress, and M. Sudit, “Energy Efficient Multi-mode Operation for Networked Wireless Sensors,” in Proceedings of IEEE Vehicle Technology Conference, Dallas TX, September 25-28, 2005.
J. Tillett, S. J. Yang, R. Rao and F. Sahin, “Application of particle swarm techniques in sensor network configuration,” in Proceedings of SPIE Unattended Ground Sensor Technologies and Applications VII, Vol.5796, p.363-373, May 2005.
C. Cress, S. J. Yang, and M. Sudit, “Energy Efficient Data Retrieval for Networked Multimode Wireless Sensors,” in Proceedings of ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor and Ubiquitous Networks, Venice, Italy, October 2004.
J. Tillett, S. J. Yang, R. Rao and F. Sahin, “Optimal topologies for wireless sensor networks,” in Proceedings of SPIE European Symposium on Optics and Photonics in Security & Defense, October 2004.
S. J. Yang and G. de Veciana, “Size Based Adaptive Bandwidth Allocation: Optimizing the QoS for Elastic Flows,” in Proceedings of IEEE INFOCOM’02, Vol.2, p.1-10, 2002.
S. J. Yang and G. de Veciana, “Bandwidth Sharing: The Role of User Impatience,” in Proceedings of IEEE GLOBECOM’01, p.2258-2262, Nov. 2001.
S. J. Yang, X. Su and G. de Veciana, “Heterogeneity-aware Shortest Path Routing: Flow Holding Time, User Demand, and Network State,” Proceedings of 2001 IEEE Workshop on High Performance Switching and Routing (HPSR’01), p.287-297, 2001.
Y.-S. Lin, S. J. Yang, S.-J. Fang, and C. B. Shung, “VLSI Design of a Priority Arbitrator for Shared Buffer ATM Switches,” in Proceedings of IEEE International Symposium on Circuits and Systems, vol. 4, 1997, p.2785-2788.
S.-J. Fang, Y.-S. Lin, S. J. Yang, and C. B. Shung, “Reactive Bandwidth Arbitration for Priority and Multicasting Control in ATM Switch,” in Proceedings of IEEE International Conference on Communications vol. 3, 1997, p.1724-1728.
Shanchieh Jay Yang, “Dynamic resource allocation on networks supporting elastic users,” Ph.D. Dissertation, 2001, University of Texas at Austin.
Shanchieh Jay Yang, “Traffic Dispersion for Bursty Traffic on Heterogeneous Networks,” Master Report, 1998, University of Texas at Austin.