Shanchieh Jay Yang
Název
Citace
Citace
Rok
High level information fusion for tracking and projection of multistage cyber attacks
SJ Yang, A Stotz, J Holsopple, M Sudit, M Kuhl
Information Fusion 10 (1), 107-121, 2009
952009
Projecting cyberattacks through variable-length markov models
DS Fava, SR Byers, SJ Yang
IEEE Transactions on Information Forensics and Security 3 (3), 359-369, 2008
952008
Size-based adaptive bandwidth allocation: Optimizing the average QoS for elastic flows
S Yang, G De Veciana
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
682002
TANDI: Threat assessment of network data and information
J Holsopple, SJ Yang, M Sudit
Multisensor, Multisource Information Fusion: Architectures, Algorithms, and …, 2006
572006
FuSIA: Future situation and impact awareness
J Holsopple, SJ Yang
2008 11th International Conference on Information Fusion, 1-8, 2008
512008
Social computing, behavioral-cultural modeling and prediction
SJ Yang, AM Greenberg, M Endsley
College Park, MD: Springer, 238, 2012
45*2012
Bandwidth sharing: The role of user impatience
S Yang, G De Veciana
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001
382001
Enhancing both network and user performance for networks supporting best effort traffic
SJ Yang, G de Veciana
IEEE/ACM Transactions on Networking 12 (2), 349-360, 2004
372004
Enhancing situation awareness via automated situation assessment
J Holsopple, M Sudit, M Nusinov, DF Liu, H Du, SJ Yang
IEEE Communications Magazine 48 (3), 146-152, 2010
332010
Intrusion activity projection for cyber situational awareness
SJ Yang, S Byers, J Holsopple, B Argauer, D Fava
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
332008
Discovering collaborative cyber attack patterns using social network analysis
H Du, SJ Yang
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2011
322011
VTAC: Virtual terrain assisted impact assessment for cyber attacks
BJ Argauer, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
322008
Toward ensemble characterization and projection of multistage cyber attacks
H Du, DF Liu, J Holsopple, SJ Yang
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
302010
Evaluating threat assessment for multi-stage cyber attacks
SJ Yang, J Holsopple, M Sudit
MILCOM 2006-2006 IEEE Military Communications conference, 1-7, 2006
292006
Intrusion signature creation via clustering anomalies
GR Hendry, SJ Yang
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008
282008
Predicting cyber attacks with bayesian networks using unconventional signals
A Okutan, SJ Yang, K McConky
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
272017
Time series forecasting of cyber attack intensity
G Werner, S Yang, K McConky
Proceedings of the 12th Annual Conference on cyber and information security …, 2017
272017
Attack projection
SJ Yang, H Du, J Holsopple, M Sudit
Cyber Defense and Situational Awareness, 239-261, 2014
272014
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary)
JJ Salerno, SJ Yang, I Kadar, M Sudit, GP Tadda, J Holsopple
2010 13th International Conference on Information Fusion, 1-17, 2010
252010
Summary of human social, cultural, behavioral (HSCB) modeling for information fusion panel discussion
E Blasch, J Salerno, I Kadar, SJ Yang, L Fenstermacher, M Endsley, ...
Signal Processing, Sensor Fusion, and Target Recognition XXII 8745, 87451I, 2013
242013
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20