关注
T. Andrew Yang
T. Andrew Yang
在 uhcl.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
A survey of edge computing-based designs for IoT security
K Sha, TA Yang, W Wei, S Davari
Digital Communications and Networks 6 (2), 195-202, 2020
3082020
On security challenges and open issues in Internet of Things
K Sha, W Wei, TA Yang, Z Wang, W Shi
Future generation computer systems 83, 326-337, 2018
3002018
Social networking as a new trend in e-marketing
TA Yang, DJ Kim, V Dhalwani
Research and Practical Issues of Enterprise Information Systems II: Volume 2 …, 2008
802008
Design of network security projects using honeypots
K Sadasivam, B Samudrala, TA Yang
Journal of Computing Sciences in Colleges 20 (4), 282-293, 2005
792005
OCO: Optimized communication & organization for target tracking in wireless sensor networks
SPM Tran, TA Yang
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
712006
EdgeSec: Design of an edge layer security service to enhance IoT security
K Sha, R Errabelly, W Wei, TA Yang, Z Wang
2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), 81-88, 2017
662017
Wireless LAN security and laboratory designs
Y Zahur, TA Yang
Journal of Computing Sciences in Colleges 19 (3), 44-60, 2004
662004
The 8C framework as a reference model for collaborative value Webs in the context of Web 2.0
TA Yang, DJ Kim, V Dhalwani, TK Vu
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
652008
Computer security and impact on computer science education
TA Yang
Proceedings of the sixth annual CCSC northeastern conference on The journal …, 2001
622001
Security co-existence of wireless sensor networks and RFID for pervasive computing
B Sun, Y Xiao, CC Li, HH Chen, TA Yang
Computer Communications 31 (18), 4294-4303, 2008
492008
Path planning and evaluation in IVHS databases
TA Yang, S Shekhar, B Hamidzadeh, PA Hancock
Vehicle Navigation and Information Systems Conference, 1991 2, 283-290, 1991
411991
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
B Sun, G Yan, Y Xiao, TA Yang
Ad Hoc Networks 7 (8), 1489-1500, 2009
392009
Evaluations of target tracking in wireless sensor networks
SPM Tran, TA Yang
Proceedings of the 37th SIGCSE technical symposium on Computer science …, 2006
392006
Design of a distributed computer security lab
TA Yang, KB Yue, M Liaw, G Collins, JT Venkatraman, S Achar, ...
Journal of Computing Sciences in Colleges 20 (1), 332-346, 2004
382004
Is the nice cybersecurity workforce framework (ncwf) effective for a workforce comprising of interdisciplinary majors?
J Jacob, W Wei, K Sha, S Davari, TA Yang
Proceedings of the 16th International Conference on Scientific Computing …, 2018
292018
Risk management in the era of byod: the quintet of technology adoption, controls, liabilities, user perception, and user behavior
TA Yang, R Vlas, A Yang, C Vlas
2013 International Conference on Social Computing, 411-416, 2013
292013
Open courseware and computer science education
KB Yue, TA Yang, W Ding, P Chen
Journal of Computing Sciences in Colleges 20 (1), 178-186, 2004
282004
An intelligent vehicle highway information management system
S Shekhar, TA Yang, PA Hancock
Computer‐Aided Civil and Infrastructure Engineering 8 (3), 175-198, 1993
281993
Interdisciplinary cybersecurity: Rethinking the approach and the process
J Jacob, M Peters, TA Yang
National Cyber Summit (NCS) Research Track, 61-74, 2020
172020
An exploratory analysis of blockchain: applications, security, and related issues
D Kamboj, TA Yang
Proceedings of the International Conference on Scientific Computing (CSC), 67-73, 2018
142018
系统目前无法执行此操作,请稍后再试。
文章 1–20