Yong Wang
Yong Wang
Associate Professor, Dakota State University
Verified email at dsu.edu - Homepage
Title
Cited by
Cited by
Year
A survey of security issues in wireless sensor networks
Y Wang, G Attebury, B Ramamurthy
11512006
Smartphone security challenges
Y Wang, K Streff, S Raman
Computer 45 (12), 52-58, 2012
1142012
Bring your own device security issues and challenges
Y Wang, J Wei, K Vangury
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 80-85, 2014
942014
Mobile payment security, threats, and challenges
Y Wang, C Hahn, K Sutrave
2016 second international conference on mobile and secure services …, 2016
832016
Hypervisor-based cloud intrusion detection system
J Nikolai, Y Wang
2014 International Conference on Computing, Networking and Communications …, 2014
662014
KeyRev: An efficient key revocation scheme for wireless sensor networks
Y Wang, B Ramamurthy, X Zou
2007 IEEE International Conference on Communications, 1260-1265, 2007
542007
Mobile malware security challeges and cloud-based detection
N Penning, M Hoffman, J Nikolai, Y Wang
2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014
442014
The performance of elliptic curve based group diffie-hellman protocols for secure group communication over ad hoc networks
Y Wang, B Ramamurthy, X Zou
2006 IEEE International Conference on Communications 5, 2243-2248, 2006
442006
Sonet: A social network model for privacy monitoring and ranking
RK Nepali, Y Wang
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
432013
You look suspicious!!: Leveraging visible attributes to classify malicious short urls on twitter
RK Nepali, Y Wang
2016 49th Hawaii International Conference on System Sciences (HICSS), 2648-2655, 2016
352016
Social network privacy measurement and simulation
Y Wang, RK Nepali, J Nikolai
2014 International Conference on Computing, Networking and Communications …, 2014
332014
Group rekeying schemes for secure group communication in wireless sensor networks
Y Wang, B Ramamurthy
2007 IEEE International Conference on Communications, 3419-3424, 2007
322007
Big Data LifeCycle: Threats and Security Model.
Y Alshboul, RK Nepali, Y Wang
AMCIS, 2015
292015
A key management protocol for wireless sensor networks with multiple base stations
Y Wang, B Ramamurthy, Y Xue
2008 IEEE International Conference on Communications, 1625-1629, 2008
292008
Mobile security testing approaches and challenges
Y Wang, Y Alshboul
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015
272015
End-to-end trust and security for Internet of Things applications
S Bhattarai, Y Wang
Computer 51 (4), 20-27, 2018
262018
Detecting malicious short URLs on Twitter
Y Alshboul, R Nepali, Y Wang
192015
Privacy measurement for social network actor model
Y Wang, RK Nepali
2013 International Conference on Social Computing, 659-664, 2013
192013
LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks
Y Xue, B Ramamurthy, Y Wang
Computer Communications 32 (15), 1666-1676, 2009
192009
Remote mobile screen (RMS): An approach for secure BYOD environments
SG Ocano, B Ramamurthy, Y Wang
2015 International Conference on Computing, Networking and Communications …, 2015
162015
The system can't perform the operation now. Try again later.
Articles 1–20