Jianhua Yang, Yien Wang, “Denial of Service Hands-on Lab for Information Assurance
Education: a Case Study”, Information Security Education Journal, Vol. 2,
No. 2, pp 68-75, January 2016
Jianhua Yang, Thomas Reddington, “Enhance Learning through Developing Network
Security Hands-on Lab for Online Students”, Information Security Education
Journal, Vol. 2, No. 1, pp 19-27, June 2015
Yongzhong Zhang,
Yuanyi Qi, Lamei Wang, Jianhua
Yang, “The Study of Fluid Learning Styles under Open Education”,
International Journal of Education and Social Science, Vol.2, Issue 1, pp
82-91, January 2015.
Jianhua Yang, Xiaozhu Lin, David Woolbright, Wayne Summers, “A New Technique for
Counting Objects in Binary Images”,
Journal of Computer Vision and Image Processing, Vol. 3, No. 4, pp 1-14,
2013.
Xiaozhu
Lin, Jianhua Yang, Wayne Summers,
David Woolbright, “Hold Holes Countable in Binary Images”,
Journal of Computer Vision and Image Processing, Vol. 3, No. 1, pp
44-55, 2013.
Yongzhong
Zhang, Yuanxi Qi, Jianhua Yang,
“Online Course Design in the Context of Cloud Computing”,
Advances in Intelligent and Soft Computing
(book), 2012, Volume 108/2012, Springer, pp. 193-200.
DOI: 10.1007/978-3-642-24775-0_31
Jianhua Yang, David Woodbright, “Correlating TCP/IP Packet Contexts to Detect
Stepping-Stone Intrusion”, Journal of Computers and Security, Elsevier Ltd.,
Vol. 30, No. 6-7, pp 538-546,
August 2011.
Lydia
Ray, Jianhua Yang, “Beyond the
Security Track: Embed Security Education across Undergraduate Computing
Curricula Using M-Thread Approach”, International Journal of Computer
Science and Network Security, Vol. 11, No. 8, pp 131-137, August 2011.
Jianhua Yang, Guoqing Zhao, Stephen S. –H. Huang, “Analyzing and Correlating
Interactive Sessions with One-Dimensional Random Walk to Detect
Stepping-Stone Intrusion “, Transactions on Computers and Intelligent
Systems, pp 78-85, Vol. 1 No. 2 2009, ISBN 1798-2448.
Yongzhong Zhang,
Jianhua Yang, Chunming Ye, “Modeling and Detecting Stepping-Stone
Intrusion”, International Journal of Computer Science and Network Security,
Vol. 9, No. 7, pp 200-205, July 2009.
Jianhua Yang, Stephen Huang, “Mining TCP/IP Packets to Detect Stepping-Stone
Intrusion”, Journal of Computers and Security, Elsevier Ltd., pp 479-484,
Vol. 26 (2007).
Jianhua Yang, Stephen Huang, “Probabilistic Analysis of an Algorithm to Compute TCP
Packet Round-Trip Time for Intrusion Detection”, Journal of Computers and
Security, Elsevier Ltd., pp 137-144, Vol. 26 (2007).
Jianhua Yang, Stephen Huang, “Matching TCP/IP Packets to Detect Stepping-Stone
Intrusion”, International Journal of Computer Science and Network Security,
Vol. 6, No. 4,pp 269-276, October 2006.
Peer-reviewed proceeding papers