default search action
T. Andrew Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Alan Yang, T. Andrew Yang:
Social Dangers of Generative Artificial Intelligence: Review and Guidelines. DG.O 2024: 654-658 - 2020
- [j4]Kewei Sha, T. Andrew Yang, Wei Wei, Sadegh Davari:
A survey of edge computing-based designs for IoT security. Digit. Commun. Networks 6(2): 195-202 (2020)
2010 – 2019
- 2019
- [c16]Johanna Jacob, Michelle Peters, T. Andrew Yang:
Interdisciplinary Cybersecurity: Rethinking the Approach and the Process. NCS 2019: 61-74 - 2018
- [j3]Kewei Sha, Wei Wei, T. Andrew Yang, Zhiwei Wang, Weisong Shi:
On security challenges and open issues in Internet of Things. Future Gener. Comput. Syst. 83: 326-337 (2018) - [c15]Kevin Kim, Justin Smith, T. Andrew Yang, Dan J. Kim:
An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework. NCS 2018: 1-7 - 2017
- [c14]Kewei Sha, Ranadheer Errabelly, Wei Wei, T. Andrew Yang, Zhiwei Wang:
EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security. ICFEC 2017: 81-88 - 2016
- [c13]Wei Wei, Arti Mann, Kewei Sha, T. Andrew Yang:
Design and implementation of a multi-facet hierarchical cybersecurity education framework. ISI 2016: 273-278 - 2015
- [c12]Arti Mann, Wei Wei, Ravi Badana, Tong Zhang, T. Andrew Yang:
Use Cases and Development of Software Defined Networks in OpenStack. CIT/IUCC/DASC/PICom 2015: 947-953 - 2013
- [c11]T. Andrew Yang, Radu E. Vlas, Alan Yang, Cristina Vlas:
Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior. SocialCom 2013: 411-416 - 2010
- [c10]Dan J. Kim, T. Andrew Yang:
A New Approach for Collaborative Knowledge Management: A Unified Conceptual Model for Collaborative Knowledg Management. AMCIS 2010: 131
2000 – 2009
- 2009
- [j2]Bo Sun, Guanhua Yan, Yang Xiao, T. Andrew Yang:
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications. Ad Hoc Networks 7(8): 1489-1500 (2009) - [c9]Ninad Naik, Dan J. Kim, T. Andrew Yang, Kwok-Bun Yue, Hisham Al-Mubaid:
Critical Factors Influencing the Service Quality of Information Systems: An Organizational View. AMCIS 2009: 416 - 2008
- [j1]Bo Sun, Yang Xiao, Chung-Chih Li, Hsiao-Hwa Chen, T. Andrew Yang:
Security co-existence of wireless sensor networks and RFID for pervasive computing. Comput. Commun. 31(18): 4294-4303 (2008) - [c8]T. Andrew Yang, Dan J. Kim, Vishal Dhalwani, Tri K. Vu:
The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0. HICSS 2008: 319 - 2007
- [c7]Dan J. Kim, Kwok-Bun Yue, T. Andrew Yang:
Information Assurance in B2C e-Commerce Transactions: A Process-Oriented Framework and Empirical Analysis of Websites using Semantic Networks. AMCIS 2007: 175 - [c6]T. Andrew Yang, Dan J. Kim, Vishal Dhalwani:
Social Networking as a New Trend in E-Marketing. CONFENIS (2) 2007: 847-856 - 2006
- [c5]Sam Phu Manh Tran, T. Andrew Yang:
Evaluations of target tracking in wireless sensor networks. SIGCSE 2006: 97-101 - [c4]Sam Phu Manh Tran, T. Andrew Yang:
OCO: Optimized Communication & Organization for Target Tracking in Wireless Sensor Networks. SUTC (1) 2006: 428-435 - 2005
- [c3]Karthik Sadasivam, Vishal Changrani, T. Andrew Yang:
Scenario Based Performance Evaluation of Secure Routing in MANETs. ICWN 2005: 24-32 - 2001
- [c2]T. Andrew Yang, Zac Cross, Scott MacMaster:
Development of a Web-Based Visualization System for Scientific Simulation. ICME 2001 - [c1]T. Andrew Yang:
Curriculum for simulation education: integration of computer simulation and visualization research into undergraduate degree programs. WSC 2001: 1592-1595
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint