Yong Wang
Yong Wang
Associate Professor, Dakota State University
Verified email at dsu.edu - Homepage
Title
Cited by
Cited by
Year
A survey of security issues in wireless sensor networks
Y Wang, G Attebury, B Ramamurthy
11032006
Smartphone security challenges
Y Wang, K Streff, S Raman
Computer, 52-58, 2012
1012012
Bring your own device security issues and challenges
Y Wang, J Wei, K Vangury
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 80-85, 2014
872014
Mobile payment security, threats, and challenges
Y Wang, C Hahn, K Sutrave
2016 second international conference on mobile and secure services …, 2016
612016
Hypervisor-based cloud intrusion detection system
J Nikolai, Y Wang
2014 International Conference on Computing, Networking and Communications …, 2014
602014
KeyRev: An efficient key revocation scheme for wireless sensor networks
Y Wang, B Ramamurthy, X Zou
2007 IEEE International Conference on Communications, 1260-1265, 2007
542007
The performance of elliptic curve based group diffie-hellman protocols for secure group communication over ad hoc networks
Y Wang, B Ramamurthy, X Zou
2006 IEEE International Conference on Communications 5, 2243-2248, 2006
422006
Mobile malware security challeges and cloud-based detection
N Penning, M Hoffman, J Nikolai, Y Wang
2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014
382014
Sonet: A social network model for privacy monitoring and ranking
RK Nepali, Y Wang
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
382013
Group rekeying schemes for secure group communication in wireless sensor networks
Y Wang, B Ramamurthy
2007 IEEE International Conference on Communications, 3419-3424, 2007
312007
You look suspicious!!: Leveraging visible attributes to classify malicious short urls on twitter
RK Nepali, Y Wang
2016 49th Hawaii International Conference on System Sciences (HICSS), 2648-2655, 2016
302016
Social network privacy measurement and simulation
Y Wang, RK Nepali, J Nikolai
2014 International Conference on Computing, Networking and Communications …, 2014
302014
A key management protocol for wireless sensor networks with multiple base stations
Y Wang, B Ramamurthy, Y Xue
2008 IEEE International Conference on Communications, 1625-1629, 2008
282008
Big data lifecycle: threats and security model
Y Alshboul, R Nepali, Y Wang
252015
Mobile security testing approaches and challenges
Y Wang, Y Alshboul
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015
222015
End-to-end trust and security for Internet of Things applications
S Bhattarai, Y Wang
Computer 51 (4), 20-27, 2018
192018
Privacy measurement for social network actor model
Y Wang, RK Nepali
2013 International Conference on Social Computing, 659-664, 2013
192013
RSA Public Key Cryptography Key Generation Study
Y Wang, X Yi, J Yang
Application Research of Computers 15 (3), 21-24, 1998
16*1998
Detecting malicious short URLs on Twitter
Y Alshboul, R Nepali, Y Wang
152015
LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks
Y Xue, B Ramamurthy, Y Wang
Computer Communications 32 (15), 1666-1676, 2009
152009
The system can't perform the operation now. Try again later.
Articles 1–20