Shanchieh (Jay) Yang
Title
Cited by
Cited by
Year
High level information fusion for tracking and projection of multistage cyber attacks
SJ Yang, A Stotz, J Holsopple, M Sudit, M Kuhl
Information Fusion 10 (1), 107-121, 2009
1002009
Projecting cyberattacks through variable-length markov models
DS Fava, SR Byers, SJ Yang
IEEE Transactions on Information Forensics and Security 3 (3), 359-369, 2008
982008
Size-based adaptive bandwidth allocation: Optimizing the average QoS for elastic flows
S Yang, G De Veciana
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
722002
TANDI: Threat assessment of network data and information
J Holsopple, SJ Yang, M Sudit
Multisensor, Multisource Information Fusion: Architectures, Algorithms, and …, 2006
572006
FuSIA: Future situation and impact awareness
J Holsopple, SJ Yang
2008 11th International Conference on Information Fusion, 1-8, 2008
532008
Enhancing both network and user performance for networks supporting best effort traffic
SJ Yang, G de Veciana
IEEE/ACM Transactions on Networking 12 (2), 349-360, 2004
402004
Bandwidth sharing: The role of user impatience
S Yang, G De Veciana
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001
402001
Enhancing situation awareness via automated situation assessment
J Holsopple, M Sudit, M Nusinov, DF Liu, H Du, SJ Yang
IEEE Communications Magazine 48 (3), 146-152, 2010
372010
Intrusion activity projection for cyber situational awareness
SJ Yang, S Byers, J Holsopple, B Argauer, D Fava
2008 IEEE international conference on intelligence and security informatics …, 2008
362008
Predicting cyber attacks with bayesian networks using unconventional signals
A Okutan, SJ Yang, K McConky
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
342017
Discovering collaborative cyber attack patterns using social network analysis
H Du, SJ Yang
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2011
342011
VTAC: Virtual terrain assisted impact assessment for cyber attacks
BJ Argauer, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
332008
Intrusion signature creation via clustering anomalies
GR Hendry, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
332008
Time series forecasting of cyber attack intensity
G Werner, S Yang, K McConky
Proceedings of the 12th Annual Conference on cyber and information security …, 2017
322017
Attack projection
SJ Yang, H Du, J Holsopple, M Sudit
Cyber Defense and Situational Awareness, 239-261, 2014
322014
Evaluating threat assessment for multi-stage cyber attacks
SJ Yang, J Holsopple, M Sudit
MILCOM 2006-2006 IEEE Military Communications conference, 1-7, 2006
322006
Toward ensemble characterization and projection of multistage cyber attacks
H Du, DF Liu, J Holsopple, SJ Yang
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
312010
Social Computing, Behavioral-Cultural Modeling and Prediction
SJ Yang, AM Greenberg, M Endsley
College Park, MD: Springer, 238, 2012
29*2012
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary)
JJ Salerno, SJ Yang, I Kadar, M Sudit, GP Tadda, J Holsopple
2010 13th International Conference on Information Fusion, 1-17, 2010
292010
Summary of human social, cultural, behavioral (HSCB) modeling for information fusion panel discussion
E Blasch, J Salerno, I Kadar, SJ Yang, L Fenstermacher, M Endsley, ...
Signal Processing, Sensor Fusion, and Target Recognition XXII 8745, 87451I, 2013
252013
The system can't perform the operation now. Try again later.
Articles 1–20