Peer-reviewed journal papers                            Home

  1. Jianhua Yang, Yien Wang, “Denial of Service Hands-on Lab for Information Assurance Education: a Case Study”, Information Security Education Journal, Vol. 2, No. 2, pp 68-75, January 2016

  2. Jianhua Yang, Thomas Reddington, “Enhance Learning through Developing Network Security Hands-on Lab for Online Students”, Information Security Education Journal, Vol. 2, No. 1, pp 19-27, June 2015

  3. Yongzhong Zhang, Yuanyi Qi, Lamei Wang,  Jianhua Yang, “The Study of Fluid Learning Styles under Open Education”, International Journal of Education and Social Science, Vol.2, Issue 1, pp 82-91, January 2015.

  4. Jianhua Yang, Xiaozhu Lin, David Woolbright, Wayne Summers, “A New Technique for Counting Objects in Binary Images”, Journal of Computer Vision and Image Processing, Vol. 3, No. 4, pp 1-14, 2013.

  5.  Xiaozhu Lin, Jianhua Yang, Wayne Summers, David Woolbright, “Hold Holes Countable in Binary Images”, Journal of Computer Vision and Image Processing, Vol. 3, No. 1, pp 44-55, 2013.

  6.  Yongzhong Zhang, Yuanxi Qi, Jianhua Yang, “Online Course Design in the Context of Cloud Computing”, Advances in Intelligent and Soft Computing (book), 2012, Volume 108/2012, Springer, pp. 193-200. DOI: 10.1007/978-3-642-24775-0_31

  7. Jianhua Yang, David Woodbright, “Correlating TCP/IP Packet Contexts to Detect Stepping-Stone Intrusion”, Journal of Computers and Security, Elsevier Ltd., Vol. 30, No. 6-7, pp 538-546,  August 2011.

  8.  Lydia Ray, Jianhua Yang, “Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach”, International Journal of Computer Science and Network Security, Vol. 11, No. 8, pp 131-137, August 2011.

  9. Jianhua Yang, Guoqing Zhao, Stephen S. –H. Huang, “Analyzing and Correlating Interactive Sessions with One-Dimensional Random Walk to Detect Stepping-Stone Intrusion “, Transactions on Computers and Intelligent Systems, pp 78-85, Vol. 1 No. 2 2009, ISBN 1798-2448.  

  10. Yongzhong Zhang, Jianhua Yang, Chunming Ye, “Modeling and Detecting Stepping-Stone Intrusion”, International Journal of Computer Science and Network Security, Vol. 9, No. 7, pp 200-205, July 2009.

  11. Jianhua Yang, Stephen Huang, “Mining TCP/IP Packets to Detect Stepping-Stone Intrusion”, Journal of Computers and Security, Elsevier Ltd., pp 479-484, Vol. 26 (2007).

  12. Jianhua Yang, Stephen Huang, “Probabilistic Analysis of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection”, Journal of Computers and Security, Elsevier Ltd., pp 137-144, Vol. 26 (2007).

  13.  Jianhua Yang, Stephen Huang, “Matching TCP/IP Packets to Detect Stepping-Stone Intrusion”, International Journal of Computer Science and Network Security, Vol. 6, No. 4,pp 269-276, October 2006.

  14. Jianhua Yang, Stephen Huang, “Correlating Temporal Thumbprint for Tracing Intruders”, International Journal of Systematics, Cybernetics, and Informatics, Vol. 4, No. 4, September, 2006.

 

Peer-reviewed proceeding papers

  1. Jianhua Yang, Yongzhong Zhang, Guoqing Zhao “Integrate Stepping-Stone Intrusion Technique into Cybersecurity Curriculum”, the Proceedings of 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, to be published in IEEE proceedings and Digital Library, March, 2017.
  2.  Dianyuan Han, Jianhua Yang, Wayne Summers “Inject Steganography into Cybersecurity Education ”, the Proceedings of 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, to be published in IEEE proceedings and Digital Library, March, 2017.
  3.  Yien Wang, Jianhua Yang “Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool”, the Proceedings of 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, to be published in IEEE proceedings and Digital Library, March, 2017.
  4. Jianhua Yang, Yien Wang, Thomas Reddington “Integrating Hacking Technique into Information Assurance Education”, the Proceedings of 30th IEEE International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, IEEE proceedings and Digital Library, pp. 381-387, March, 2016. (Accepting rate = 29%)
  5. Jianhua Yang “Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-based Random Walk”, the Proceedings of 30th IEEE International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, IEEE proceedings and Digital Library, pp. 784-789, March, 2016. (Accepting rate = 29%)
  6. Yien Wang, Jianhua Yang, “Host Exploitation and Maintenance Access-Essential Penetration Hands-on Labs for Enhancing Information Assurance Education,” Proceedings of 8th International Conference of Education, Research and Innovation (ISBN: 978-84-608-2657-6/ISSN: 2340-1095), Seville, Spain. November 18-20, 2015, pp. 3637-3642. 
  7. Yien Wang, Jianhua Yang, “Enhance Distance Learning through Virtual Lab System”, Bird of the Feather, NIST 2015-6th Annual Conference & Expo, Paradise Point, San Diego, CA November 3-4, 2015.   
  8.  Jianhua Yang, Yien Wang, “Denial of Service Hands-on Lab for Information Assurance Education: a Case Study”, 2015 Information Security Curriculum Development Conference, abstract to be published in ACM digital library, Kennesaw, GA, October, 2015
  9.  Jianhua Yang, Yongzhong Zhang, “RTT-based Random Walk Approach to Detect Stepping-Stone Intrusion”, the Proceedings of 29th IEEE International Conference on Advanced Information Networking and Applications, Gwangju, South Korea, IEEE proceedings and Digital Library (ISBN 978-1-4799-7905-9), March, 2015, pp. 558-563.  (Accepting rate 140/472= 28%)
  10. Jianhua Yang, Thomas Reddington, “Enhance Learning through Developing Network Security Hands-on Lab for Online Students”, abstract to be published in ACM digital library, Kennesaw, GA, October, 2014.
  11.  Yongzhong Zhang, Jianhua Yang, “A Comprehensive Model in Online Course Design Under Ubiquitous Learning Environment”, the Proceedings of 3rd International Conference on Computer Science Education: Innovation and Technology, Singapore, Sep. 2012. DOI: 10.5176/2251-2195_CSEIT12.44
  12. Yingjie Sheng, Yongzhon Zhang, Jianhua Yang “Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion”, the Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications, Fukuoka, Japan, IEEE proceedings and Digital Library, pp. 862-867, March, 2012. (Accepting rate = 29%)
  13. Lydia Ray, Jianhua Yang, “Forensic Analysis on IPod Touch Generation II”, 2011 Information Security Curriculum Development Conference, to be published in ACM digital library, Kennesaw, GA, October, 2011
  14. Jianhua Yang, Lydia Ray, Guoqing Zhao, “Detecting Stepping-stone Insider Attacks by Network Traffic Mining and Dynamic Programming”, the Proceedings of 25th IEEE International Conference on Advanced Information Networking and Applications (AINA 2011), Singapore, pp. 151-158, March, 2011.
  15. Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang, “ Using Dynamic Programming Techniques to Detect Multi-Hop Stepping-Stone Pairs in a Connection Chain”, the Proceedings of 24th  IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, April 2010
  16. Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S.-H. Huang, “Resist Intruders‘ Manipulation via Context-based TCP/IP Packet Matching”, the Proceedings of 24th  IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, April 2010
  17.  Jianhua Yang, Yongzhong Zhang, “A New Model to Detect Stepping-stone Intrusion”, 2nd International Workshop of Computer Science and Engineering, published in IEEE digital library, Qingdao, China, October, 2009. (Accepting rate = 37%).
  18.  Jianhua Yang, Edward Bosworth, “An Efficient TCP/IP Packet Matching Algorithm to Detect Stepping-Stone Intrusion”, 2009 Information Security Curriculum Development Conference, published in ACM digital library, Kennesaw, GA, September, 2009.
  19.   Guoqing Zhao, Jianhua Yang, Long Ni, Gurdeep S. Hura, and Shou-Hsuan Stephen Huang, "Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion," the Proceedings of 23nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2009), Bradford, UK, May 2009
  20. Yongzhong Zhang, Chunming Ye, Jianhua Yang, “Applying Signal Processing Technology to Stepping-stone Intrusion Detection”, the Proceedings of IEEE International Symposium on Intelligent Information Technology Application, Shanghai, China, December, 2008.
  21. Jianhua Yang, Byong Lee, “Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching”, Lecture Notes in Computer Science (LNCS) by Spring-Verlag, 5th IEEE International Conference on Automatic and Trusted Computing, Oslo, Norway, Vol. 5060, pp 2-12 June,2008.(Accepting rate=28/125)
  22. Long Ni, Jianhua Yang, Ran Zhang, David Song, "Matching TCP/IP Packets to Resist Stepping-Stone Intruders’ Evasion," the Proceedings of IEEE 40th Southeastern Symposium on System Theory(SSST08), New Orleans, LA, pp 64-68, March 2008.
  23. Jianhua Yang, Byong Lee, Shou-Hsuan Stephen Huang, "Monitoring Network Traffic to Detect Stepping-Stone Intrusion," the Proceedings of 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2008), Okinawa, Japan, pp 56-61 March 2008.
  24.  Stephen Huang, Robert Lychev, Jianhua Yang, “Stepping-Stone Detection via Request-Response Traffic Analysis” to be published in Lecture Notes in Computer Science (LNCS) by Spring-Verlag, 4th IEEE International Conference on Automatic and Trusted Computing, Hong Kong, China, pp 276-285 July, 2007.(Accepting rate=60/242)
  25.   Jianhua Yang, Byong Lee, Yongzhong Zhang, “Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis”, Lecture Notes in Computer Science (LNCS) by Spring-Verlag, 5th International Conference on Cryptology and Network Security, Suzhou, China, Vol. 4301, pp 303-317, Dec. 2006. (Accepting rate=26/148)
  26.  Yongzhong Zhang, Jianhua Yang, Chunming Ye, “Resistance Analysis to Evasion of a Novel Algorithm of Detecting Stepping-Stone”, Lecture Notes in Computer Science (LNCS) by Spring-Verlag, 3rd IEEE International Conference on Automatic and Trusted Computing, Wuhan, China, Vol. 4158, pp 477-486, Sep. 2006. (Accepting rate=60/208)
  27. Jianhua Yang, Shou-Hsuan Stephen Huang, Yongzhong Zhang, “Resistance Analysis to Intruders’ Evasion of Detecting Intrusion”, Lecture Notes in Computer Science (LNCS) by Springer-Verlag, 9th Information Security Conference, Samos, Greece, Vol. 4176, pp 383-398, Sep. 2006.(Accepting rate=38/204)
  28. Jianhua Yang, Yongzhong Zhang, “Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection”, Lecture Notes in Computer Science (LNCS) by Springer-Verlag,Vol.3989,pp 18-32,2006.(Accepting rate=32/208)
  29. Jianhua Yang, Shou-Hsuan Stephen Huang, Ming D. Wan, "A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection," Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), Vienna, Austria, April 2006, Vol. 1, pp 231-236.(Accepting rate=30%)
  30.   Ming D. Wan, Shou-Hsuan Stephen Huang, Jianhua Yang, "Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection," Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), Vienna, Austria, April 2006, Vol. 1, pp 255-260. (Accepting rate=30%)
  31.  Jianhua Yang, Shou-Hsuan Stephen Huang, "A Way by Estimating the Variation of TCP Packet Round-Trip Time to Detect Stepping-Stone Intrusion (Extended Abstract)," published electronically at the web site of the 21st Annual Computer Security Applications Conference (ACSAC 05), Tucson, Arizona, December 2005. (Accepting rate=26%)
  32. Jianhua Yang, Shou-Hsuan Stephen Huang, "Charactering and Estimating Network Fluctuation for Detecting Interactive Stepping-Stone Intrusion," the Proceedings of International Conference on Communication, Network and Information Security, Phoenix, Arizona, November 2005, pp. 70-75. (Accepting rate=34%)
  33. Jianhua Yang, Shou-Hsuan Stephen Huang, "Improved Thumbprint and Its Application for Intrusion Detection," Lecture Notes in Computer Science (LNCS) by Springer-Verlag, Vol. 3619, pp 433-442, 2005. (Accepting rate=22%)
  34. Jianhua Yang, Shou-Hsuan Stephen Huang, "Correlating Temporal Thumbprint for Tracing Intruders," Proceedings of 3rd International Conference on Computing, Communications and Control Technologies, Austin, Texas, July 2005, pp.236-241. (Accepting rate=38%)
  35.  Jianhua Yang, Shou-Hsuan Stephen Huang, "Matching TCP Packets and Its Application to the Detection of Long Connection Chains," Proceedings of 19th IEEE International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, China, March 2005, pp 1005-1010. (Accepting rate=27%)
  36. Jianhua Yang, Shou-Hsuan Stephen Huang, "A Real-Time Algorithm to Detect Long Connection Chains of Interactive Terminal Sessions," Proceedings of 3rd ACM International Conference on Information Security (Infosecu'04), Shanghai, China, November 2004, pp. 198-203. (Accepting rate=25%)