Books and Book Chapters
  1. Sandeep Kumar Lakkaraju, Dianxiang Xu, and Yong Wang, A Contextual Model to Integrate Healthcare Workflows and Access Control Policies (010917-120853), Book chapter in Handbook of Research on Emerging Perspectives on Healthcare Information Systems and Informatics, IGI Global, 2018.
  2. Yong Wang and Jason Nikolai, Key Management in CPS, Book chapter in Security and Privacy in Cyber-Physical Systems: Foundations and Applications (Hongbing, Song, Glenn A. Fink, Gilad L. Rosner, Sabina Jeschke), published by Wiley Co., November 2017.
  3. Yong Wang, Byrav Ramamurthy, and Yuyan Xue, A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations, In Handbook on Sensor Networks (Yang Xiao, Hui Chen and Frank H. Li, eds), published by World Scientific Publishing Co., 2010.
  4. Yong Wang, Garhan Attebury, and Byrav Ramamurthy, Security in Wireless Sensor Networks, Book chapter in Security in Wireless Mesh Networks (Yan Zhang, Jun Zheng and Honglin Hu, eds.), published by Auerbach Publications, CRC Press, 2008.
  5. Author: K. S. Siyan, P. Rybaczyk, and P. Kuo Translator: Yudan Wan, Yong Wang, and Hansheng Lin, Internetworking with NetWare TCP/IP. 1st ed. Tsinghua University Press, Beijing, China, ISBN 7-302-02506-1/TP.1268, 1997.
  6. Xianggang Wang, Yong Wang, and Yudan Wan, Netware 3.X Kernel Internals Depth Analysis: for Server. 1st ed. Tsinghua University Press, Beijing, China, ISBN 7-302-02516-9/TP.1273, 1996.
  7. Wenping Jiang, Yudan Wan, and Yong Wang, Netware 3.X Kernel Internals Depth Analysis: for Workstation. 1st ed. Tsinghua University Press, Beijing, China, ISBN 7-302-02464-2/TP.1254, 1996.
Journal Articles
  1. Melva Ratchford, Omar El-Gayar, Cherie Noteboom, and Yong Wang, BYOD Security Issues: A Systematic Literature Review, Information Security Journal: A Global Perspective, July 24, 2021.
  2. Tareq Nasralah, Omar El-Gayar, and Yong Wang, Social Media Text Mining Framework for Drug Abuse: An Opioid Crisis Case Analysis, Journal of Medical Internet Research, vol. 22, no. 8. 2020.
  3. Srinivasulu Vuggumudi and Yong Wang, Sophisticated Tools Alone Cannot Prevent Advanced Persistent Threats: What's Next? Information Systems Security Association Journal, vol. 18, no. 6, June 2020.
  4. Sulabh Bhattarai and Yong Wang, End-to-End Trust and Security for Internet of Things Applications, IEEE Computer, April 2018.
  5. Sandeep Lakkaraju, Dianxiang Xu, Yong Wang, Analysis of Healthcare Workflows in Accordance with Access Control Policies, the International Journal of Healthcare Information Systems and Informatics (IJHISI), 11(1)1-20, 2016.
  6. Yong Wang, Kevin Streff, Sonell Raman, Smartphone Security Challenges, IEEE Computer, December 2012.
  7. Yuyan Xue, Byrav Ramamurthy, Yong Wang, LTRS: A Loss-Tolerant Reliable Event Sensing Protocol for Wireless Sensor Networks, Journal of Computer Communications, 2009.
  8. Yong Wang, Byrav Ramamurthy, Xukai Zou, and Yuyan Xue, An Efficient Key Revocation Scheme for Wireless Sensor Networks, Journal of Security and Communication Networks, December 2008.
  9. Yong Wang, Garhan Attebury, and Byrav Ramamurthy, A Survey of Security Issues in Wireless Sensor Networks, IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 2-23, 2006.
  10. Jianzhan Yang, Yong Wang, and Xing Yi, Generating Strong Primes Study in RSA Cryptosystem, Journal of Wuhan University (Natural Science Edition), vol. 45, no. 3, pp. 303-306, 1999.
  11. Yong Wang, Xing Yi, and Jianzhan Yang, RSA Public Key Cryptography Key Generation Study, Application Research of Computers, vol. 82, no.2, pp. 229-232, 1998.
  12. Xing Yi, Jianzhan Yang, and Yong Wang, How to Integrate a Network Cryptographic System based on the Asymmetric Cryptography. Computer Engineering, vol.24, no. 5, pp. 52-55,1998.
  13. Yong Wang, Xiaoxing Ruan, and Xing Yi, Memory Management in Windows, Application Research of Computers, vol. 82, no.2, 1998.
  14. Yong Wang and Jianzhan Yang, The Multi-task Polling Algorithm in Novell NetWare 386 OS, Computer and Communications, vol. 16, no.1, pp. 26-29, 1998.
  15. Xianggang Wang, Wenping Jiang, Yong Wang, and Yudan Wan, Disk File System Management in Novell NetWare V3.11, Microcomputer, vol. 17, no.3, pp. 36-38, 1997.
  16. Xianggang Wang, Yong Wang, Wenping Jiang, and Yudan Wan, Process Management in Novell NetWare 386 V3.11, Microcomputer, vol. 17, no. 2, pp. 7-9,1997.
Conference and Workshop Papers
  1. Kaushik Muthusamy Ragothaman, Yong Wang, and Srinivasulu Vuggumudi, Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things, AMCIS, August 9-13, 2021.
  2. Mohammad Nur and Yong Wang, An Overview of Identity Relationship Management in the Internet of Things, 2021 IEEE International Conference on Consumer Electronics (ICCE), Jan 10-12, 2021.
  3. Yong Wang, Kaushik Muthusamy Ragothaman, and Bijay Shakya, Towards Trusted Data Processing for Information and Intelligence Systems, Hawaii International Conference on System Sciences (HICSS-54), Kauai, Hawaii, January 5-8, 2021.
  4. Kaushik Muthusamy Ragothaman and Yong Wang, A Systematic Mapping Study of Access Control in the Internet of Things, Hawaii International Conference on System Sciences (HICSS-54), Kauai, Hawaii, January 5-8, 2021.
  5. Melva M. Ratchford, Yong Wang, Cherie Noteboom, and Omar El-Gayar, BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study, AMCIS, August 12-16, 2020.
  6. Yong Wang, Elliot Kjerstad, and Bailey Belisario, A Dynamic Analysis Security Testing Infrastructure for Internet of Things, Sixth Conference on Mobile and Secure Services, Miami, Florida, Feb 22-23, 2020.
  7. Keith Jones and Yong Wang, Malgazer: An Automated Malware Classi?er With Running Window Entropy and Machine Learning, Sixth Conference on Mobile and Secure Services, Miami, Florida, Feb 22-23, 2020.
  8. Tareq Nasralah, Omar El-Gayar, and Yong Wang, Understanding the Opioid Users Activities on Social Media: Twitter Data Case Analysis, AMCIS, Cancun Mexico, August 15-17, 2019.
  9. Kevin Callies, Cherie Noteboom, Daniel Talley and Yong Wang, Employee Acceptance of Employer Control Over Personal Devices, AMCIS, Cancun Mexico, August 15-17, 2019.
  10. Kevin Callies, Cherie Noteboom, Daniel Talley and Yong Wang, Employee Acceptance of Employer Control Over Personal Devices - Research in Progress, 14th Annual Conference: Midwest Association for Information Systems, Oshkosh, WI, May 21 and 22, 2019.
  11. Kevin Wafula and Yong Wang, CARVE: A Scientific Method-Based Threat Hunting Hypothesis Development Model, 19th Annual IEEE International Conference on Electro Information Technology, Brookings, South Dakota, USA, May 20-22, 2019.
  12. Melva M. Ratchford and Yong Wang, BYOD-Insure: A Security Assessment Model for Enterprise BYOD, Fifth Conference on Mobile and Secure Services, Miami, Florida, Mar 2-3, 2019.
  13. Tareq Nasralah, Abdullah Wahbeh, Cherie Noteboom, and Yong Wang, Geographic Variations and The Utilization of Health Care Resources, AMCIS, August 2018.
  14. Yong Wang, CS4A: A New Approach for Cybersecurity Workforce Development, New Approaches to Cybersecurity Education (NACE) Workshop, New Orleans, Louisiana, June 9-10, 2018.
  15. Keith Jones and Yong Wang, An Optimized Running Window Entropy Algorithm, the National Cyber Summit, Huntsville, AL, June 5-7, 2018.
  16. Jeremias Eppler and Yong Wang, Towards Improving the Security of Mobile Systems using Virtualization and Isolation, Fourth Conference on Mobile and Secure Services, Miami, Florida, February 24-25, 2018.
  17. Tareq Allan and Yong Wang, The Demand for Technical Safeguards in the Healthcare Sector: A Historical Perspective Enlightens Deliberations about the Future, 2017 Americas Conference on Information Systems, Boston, MA, 2017.
  18. Ali Ahmed, Tareq Nasralah, Yong Wang, etc., Impact of E-Visits on Emergency Departments and Urgent Care Centers, 2017 Americas Conference on Information Systems, Boston, MA, 2017.
  19. Jason Nikolai and Yong Wang, A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, IEEE Globecom, Washington, DC, USA, December 4-8, 2016.
  20. Yong Wang and Jun Liu, An Attribute-based Statistic Model for Privacy Impact Assessment, the 2016 International Conference on Collaboration Technologies and Systems (CTS 2016), Orlando, Florida, USA, Oct 31-Nov 4, 2016.
  21. Jason Nikolai and Yong Wang, A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, IEEE Cloud, San Francisco, CA, USA, June 27-July 2, 2016.
  22. Yong Wang, Christen Hahn, and Kruttika Sutrave, Mobile Payment Security, Threats, and Challenges, Second Conference on Mobile and Secure Services, Gainesville, Florida, February 26-27, 2016.
  23. Raj Kumar Nepali and Yong Wang, You Look Suspicious!!: Leveraging visible attributes to classify malicious short URLs on Twitter, Hawaii International Conference on System Sciences (HICSS-49), Kauai, Hawaii, January 5-8, 2016.
  24. Yazan Alshboul, Yong Wang, and Raj Kumar Nepali, Big Data Life Cycle: Threats and Security Model, 2015 Americas Conference on Information Systems, Puerto Rico, 2015.
  25. Raj Kumar Nepali, Yong Wang, and Yazan Alshboul, Detecting Malicious Short URLs on Twitter, 2015 Americas Conference on Information Systems, Puerto Rico, 2015.
  26. Yong Wang, and Raj Nepali, Privacy Impact Assessment for Online Social Networks, the 2015 International Conference on Collaboration Technologies and Systems (CTS 2015), Atlanta, Georgia, USA, June 1-5, 2015.
  27. Yong Wang, and Raj Nepali, Privacy Threat Modeling Framework for Online Social Networks, the 2015 International Conference on Collaboration Technologies and Systems (CTS 2015), Atlanta, Georgia, USA, June 1-5, 2015.
  28. Yong Wang and Yazan Alshboul, Mobile Security Testing Approaches and Challenges, First Conference on Mobile and Secure Services, Gainesville, Florida, February 19-21, 2015.
  29. Yong Wang, An Automated Virtual Security Testing Platform for Android Mobile Apps, First Conference on Mobile and Secure Services, Gainesville, Florida, February 19-21, 2015.
  30. Santiago Gimenez Ocano, Byrav Ramamurthy and Yong Wang, Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, 2015 International Conference on Computing, Networking and Communication (ICNC), Anaheim, California, USA, February 16-19, 2015.
  31. Raj Nepali and Yong Wang. SocBridge: Bridging the gap between Online Social Networks, Twentieth Americas Conference on Information Systems, Savannah, Georgia, 2014.
  32. Jason Nikolai, Yong Wang, and Raj Nepali, A Framework for Examining the Human Side of Anti-Forensic Measures, Twentieth Americas Conference on Information Systems, Savannah, Georgia, 2014.
  33. Yong Wang, Karthik Vangury, and Jason Nikolai, MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, the 2014 International Conference on Collaboration Technologies and Systems (CTS 2014), Minneapolis, Minnesota, USA, May 19-23, 2014.
  34. Nicholas Penning, Michael Hoffman, Jason Nikolai, and Yong Wang, Mobile Malware Security Challenges and Cloud-Based Detection, the 2014 International Conference on Collaboration Technologies and Systems (CTS 2014), Minneapolis, Minnesota, USA, May 19-23, 2014.
  35. Jason Nikola and Yong Wang, Hypervisor-based Cloud Intrusion Detection System, 2014 International Conference on Computing, Networking and Communication (ICNC), CNC Workshop, Honolulu, Hawaii, USA, Feb 3-6, 2014.
  36. Yong Wang, Raj K Nepali, and Jason Nikolai, Social Network Privacy Measurement and Simulation, 2014 International Conference on Computing, Networking and Communication (ICNC), CNC Workshop, Honolulu, Hawaii, USA, Feb 3-6, 2014.
  37. Yong Wang, Jinpeng Wei, and Karthik Vangury, Bring Your Own Device Security Issues and Challenges, The 11th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, Nevada USA, Jan 10-13, 2014.
  38. Yong Wang and Raj Kuman Nepali, Privacy Measurement for Social Network Actor Model, The 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust, Washington D.C., USA, Sept 8-14, 2013.
  39. Raj Kumar Nepali and Yong Wang, SONET: A Social Network Model for Privacy Monitoring and Ranking, The 2nd International Workshop on Network Forensics, Security and Privacy, July 08, 2013.
  40. Yong Wang, Byrav Ramamurthy, and Yuyan Xue, A Security Framework for Wireless Sensor Networks Utilizing a Single Key, in BroadNets'08: Proceedings of Fifth International Conference on Broadband Communications, Networks, and Systems, London, UK, September 2008.
  41. Yong Wang, Byrav Ramamurthy, and Yuyan Xue, A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations, in ICC'08: Proceedings of IEEE International Conference on Communications, Beijing, China, June 2008.
  42. Yuyan Xue, Byrav Ramamurthy, and Yong Wang, Providing Loss Tolerant Reliable Data Transport Services on Wireless Sensor Networks, in ICC'08: Proceedings of IEEE International Conference on Communications, Beijing, China, June 2008.
  43. Yong Wang and Byrav Ramamurthy, A Key Management Protocol for Hybrid Wireless Sensor Networks, in BroadNets'07: Proceedings of Fourth International Conference on Broadband Communications, Networks, and Systems, Raleigh, North Carolina, September 2007.
  44. Yong Wang and Byrav Ramamurthy, Layered Clustering Communication Protocol for Wireless Sensor Networks, Proceedings of ICCCN Workshop on Advanced Networking and Communications, Honolulu, Hawaii, August 2007.
  45. Yong Wang and Byrav Ramamurthy, Centralized Group Rekeying Scheme for Secure Group Communication in Wireless Sensor Networks, in ICC'07: Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, June 2007.
  46. Yong Wang, Byrav Ramamurthy, and Xukai Zou, KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks, in ICC'07: Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, June 2007.
  47. Yong Wang and Byrav Ramamurthy, A Centralized Group Rekeying Scheme for Secure Group Communication in Wireless Sensor Networks (poster), SECURECOMM'06: 2nd International Conference on Security and Privacy in Communication Networks, Baltimore/MD, August 2006.
  48. Yong Wang and Byrav Ramamurthy, The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks, in ICC'06: Proceedings of IEEE International Conference on Communications, Istanbul, Turkey, May 2006.
  49. Yong Wang and Byrav Ramamurthy, CPQ: A Control Packet Queuing Optical Burst Switching Protocol for Supporting QoS, Proceedings of 3rd International Workshop on Optical Burst Switching (WOBS), co-located with BroadNets 2004, San Jose/CA, October 2004.
Technical Reports
  1. Yong Wang, Byrav Ramamurthy, Yuyan Xue, and Xukai Zou. uKeying: A Key Management Framework for Wireless Sensor Networks Utilizing a Unique Session Key, CSE Technical reports, TR-UNL-CSE-2007-0019, University of Nebraska Lincoln 2007.