Follow
Shanchieh (Jay) Yang
Title
Cited by
Cited by
Year
Projecting cyberattacks through variable-length markov models
DS Fava, SR Byers, SJ Yang
IEEE Transactions on Information Forensics and Security 3 (3), 359-369, 2008
1172008
High level information fusion for tracking and projection of multistage cyber attacks
SJ Yang, A Stotz, J Holsopple, M Sudit, M Kuhl
Information Fusion 10 (1), 107-121, 2009
1122009
Size-based adaptive bandwidth allocation: Optimizing the average QoS for elastic flows
S Yang, G De Veciana
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
812002
Time series forecasting of cyber attack intensity
G Werner, S Yang, K McConky
Proceedings of the 12th Annual Conference on cyber and information security …, 2017
692017
TANDI: Threat assessment of network data and information
J Holsopple, SJ Yang, M Sudit
Multisensor, Multisource Information Fusion: Architectures, Algorithms, and …, 2006
622006
FuSIA: Future situation and impact awareness
J Holsopple, SJ Yang
2008 11th International Conference on Information Fusion, 1-8, 2008
592008
Predicting cyber attacks with bayesian networks using unconventional signals
A Okutan, SJ Yang, K McConky
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
542017
Attack projection
SJ Yang, H Du, J Holsopple, M Sudit
Cyber Defense and Situational Awareness, 239-261, 2014
502014
Enhancing situation awareness via automated situation assessment
J Holsopple, M Sudit, M Nusinov, DF Liu, H Du, SJ Yang
IEEE Communications Magazine 48 (3), 146-152, 2010
492010
Intrusion signature creation via clustering anomalies
GR Hendry, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
482008
Enhancing both network and user performance for networks supporting best effort traffic
SJ Yang, G de Veciana
IEEE/ACM Transactions on Networking 12 (2), 349-360, 2004
452004
Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
S Moskal, SJ Yang, ME Kuhl
The Journal of Defense Modeling and Simulation 15 (1), 13-29, 2018
422018
Social computing, behavioral-cultural modeling and prediction
S Yang, A Greenberg, M Endsley
College Park, MD: Springer, 238, 2012
42*2012
Toward ensemble characterization and projection of multistage cyber attacks
H Du, DF Liu, J Holsopple, SJ Yang
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
412010
Intrusion activity projection for cyber situational awareness
SJ Yang, S Byers, J Holsopple, B Argauer, D Fava
2008 IEEE international conference on intelligence and security informatics …, 2008
412008
VTAC: Virtual terrain assisted impact assessment for cyber attacks
BJ Argauer, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
392008
Bandwidth sharing: The role of user impatience
S Yang, G de Veciana
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001
392001
Discovering collaborative cyber attack patterns using social network analysis
H Du, SJ Yang
Social Computing, Behavioral-Cultural Modeling and Prediction: 4th …, 2011
372011
Alert-driven attack graph generation using s-pdfa
A Nadeem, S Verwer, S Moskal, SJ Yang
IEEE transactions on dependable and secure computing 19 (2), 731-746, 2021
362021
Evaluating threat assessment for multi-stage cyber attacks
SJ Yang, J Holsopple, M Sudit
MILCOM 2006-2006 IEEE Military Communications conference, 1-7, 2006
362006
The system can't perform the operation now. Try again later.
Articles 1–20