Shanchieh (Jay) Yang
Cited by
Cited by
Projecting cyberattacks through variable-length markov models
DS Fava, SR Byers, SJ Yang
IEEE Transactions on Information Forensics and Security 3 (3), 359-369, 2008
High level information fusion for tracking and projection of multistage cyber attacks
SJ Yang, A Stotz, J Holsopple, M Sudit, M Kuhl
Information Fusion 10 (1), 107-121, 2009
Size-based adaptive bandwidth allocation: Optimizing the average QoS for elastic flows
S Yang, G De Veciana
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
Time series forecasting of cyber attack intensity
G Werner, S Yang, K McConky
Proceedings of the 12th Annual Conference on cyber and information security …, 2017
TANDI: Threat assessment of network data and information
J Holsopple, SJ Yang, M Sudit
Multisensor, Multisource Information Fusion: Architectures, Algorithms, and …, 2006
FuSIA: Future situation and impact awareness
J Holsopple, SJ Yang
2008 11th International Conference on Information Fusion, 1-8, 2008
Predicting cyber attacks with bayesian networks using unconventional signals
A Okutan, SJ Yang, K McConky
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
Social computing, behavioral-cultural modeling and prediction
S Yang, A Greenberg, M Endsley
College Park, MD: Springer, 238, 2012
Attack projection
SJ Yang, H Du, J Holsopple, M Sudit
Cyber Defense and Situational Awareness, 239-261, 2014
Enhancing situation awareness via automated situation assessment
J Holsopple, M Sudit, M Nusinov, DF Liu, H Du, SJ Yang
IEEE Communications Magazine 48 (3), 146-152, 2010
Intrusion signature creation via clustering anomalies
GR Hendry, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
Enhancing both network and user performance for networks supporting best effort traffic
SJ Yang, G de Veciana
IEEE/ACM Transactions on Networking 12 (2), 349-360, 2004
Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
S Moskal, SJ Yang, ME Kuhl
The Journal of Defense Modeling and Simulation 15 (1), 13-29, 2018
Toward ensemble characterization and projection of multistage cyber attacks
H Du, DF Liu, J Holsopple, SJ Yang
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
Alert-driven attack graph generation using s-pdfa
A Nadeem, S Verwer, S Moskal, SJ Yang
IEEE transactions on dependable and secure computing 19 (2), 731-746, 2021
Intrusion activity projection for cyber situational awareness
SJ Yang, S Byers, J Holsopple, B Argauer, D Fava
2008 IEEE international conference on intelligence and security informatics …, 2008
VTAC: Virtual terrain assisted impact assessment for cyber attacks
BJ Argauer, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
Bandwidth sharing: The role of user impatience
S Yang, G de Veciana
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001
Discovering collaborative cyber attack patterns using social network analysis
H Du, SJ Yang
Social Computing, Behavioral-Cultural Modeling and Prediction: 4th …, 2011
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary)
JJ Salerno, SJ Yang, I Kadar, M Sudit, GP Tadda, J Holsopple
2010 13th International Conference on Information Fusion, 1-17, 2010
The system can't perform the operation now. Try again later.
Articles 1–20