Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Huiming Yu is active.

Publication


Featured researches published by Huiming Yu.


technical symposium on computer science education | 2006

Teaching a web security course to practice information assurance

Huiming Yu; W. Liao; Xiaohong Yuan; Jinsheng Xu

This paper presents a hybrid teaching approach, a new Web Security course as well as how to use the hybrid approach to teach the Web Security course to practice information assurance. The hybrid teaching approach contains three key issues that are keeping the lecture materials up-to-date, assigning former research projects as comprehensive team projects, and connecting classroom knowledge with real world web applications. We have applied this approach to the teaching a Web Security course and achieved excellent results. Our experience exhibits that integrating education, research and web applications into the Web Security course to practice information assurance are essential for a sound security education. Using this approach instructors connect knowledge in the classroom to real world applications, attract students to the security area, and train students to become information assurance professionals.


Proceedings of the 9th Annual Cyber and Information Security Research Conference on | 2014

Retrieving relevant CAPEC attack patterns for secure software development

Xiaohong Yuan; Emmanuel Borkor Nuakoh; Jodria S. Beal; Huiming Yu

To improve the security of computer systems, information, and the cyber space, it is critical to engineer more secure software. To develop secure and reliable software, software developers need to have the mindset of an attacker. Attack patterns such as CAPEC are valuable resources to help software developers to think like an attacker and have the potential to be used in each phase of the secure software development life cycle. However, systematic processes or methods for utilizing existing attack pattern resources are needed. As a first step, this paper describes our ongoing effort of developing a tool to retrieve relevant CAPEC attack patterns for software development. This tool can retrieve attack patterns most relevant to a particular STRIDE type, as well as most useful to the software being developed. It can be used in conjunction with the Microsoft SDL threat modeling tool. It also allows developers to search for CAPEC attack patterns using keywords.


technical symposium on computer science education | 2016

Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only)

Xiaohong Yuan; Jinsheng Xu; Huiming Yu; Junghee Kim; Taehee Kim

The poster describes our project of Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses. We are assessing the effectiveness of experiential-learning-based teaching tools for 10 cybersecurity topics in five cybersecurity courses. For each topic, two teaching methods are selected: the control group teaching method, and the experimental group teaching method. The two teaching methods are compared to answer one of the two research questions: (1) Is using an experiential-learning-based teaching tool more effective in improving student learning than the traditional teaching method without using the teaching tool? (2) Is one experiential-learning-based teaching tool more effective than another experiential-learning-based teaching tool? We will assess the effectiveness of the teaching methods via three measures: (1) improvement in student learning outcomes, (2) improvement in student motivation in learning the topic, and (3) improvement in the student experience such as student enjoyment, satisfaction, and perceived difficulty in learning the topic. The knowledge gained from this research can be used by cybersecurity educators at other institutions to use effective teaching tools to improve cybersecurity education practices, which has the potential to increase the number of students well-prepared for entering cybersecurity careers.


ACM Transactions on Computing Education \/ ACM Journal of Educational Resources in Computing | 2010

Visualization Tools for Teaching Computer Security

Xiaohong Yuan; Percy Vega; Yaseen Qadah; Richard H. Archer; Huiming Yu; Jinsheng Xu


Journal of Computing Sciences in Colleges | 2007

An animated learning tool for Kerberos authentication architecture

Xiaohong Yuan; Yaseen Qadah; Jinsheng Xu; Huiming Yu; Ricky Archer; Bill Chu


Journal of Software | 2015

Developing Abuse Cases Based on Threat Modeling and Attack Patterns

Xiaohong Yuan; Emmanuel Borkor Nuakoh; Imano Williams; Huiming Yu


international conference on information visualization theory and applications | 2018

A VISUALIZATION BASED SIMULATOR FOR SYN FLOOD ATTACKS

Tom Terry; Huiming Yu; Kenneth Williams; Xiaohong Yuan; Bill Chu


Journal of Computing Sciences in Colleges | 2015

Testing the security vulnerabilities of OpenEMR 4.1.1: a case study

Francis Akowuah; Jerrisa Lake; Xiaohong Yuan; Emmanuel Borkor Nuakoh; Huiming Yu


international conference on computer supported education | 2011

THE DESIGN AND IMPLEMENTATION OF A CRYPTOGRAPHIC EDUCATION TOOL

Abdrah Abuzaid; Xiaohong Yuan; Huiming Yu; Bill Chu


Journal of Computing Sciences in Colleges | 2017

Evaluating hands-on labs for teaching SQL injection: a comparative study

Xiaohong Yuan; Imano Williams; Taehee Kim; Jinsheng Xu; Huiming Yu; Jung Hee Kim

Collaboration


Dive into the Huiming Yu's collaboration.

Top Co-Authors

Avatar

Xiaohong Yuan

North Carolina Agricultural and Technical State University

View shared research outputs
Top Co-Authors

Avatar

Bill Chu

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Jinsheng Xu

Michigan State University

View shared research outputs
Top Co-Authors

Avatar

Taehee Kim

North Carolina Agricultural and Technical State University

View shared research outputs
Top Co-Authors

Avatar

Imano Williams

North Carolina Agricultural and Technical State University

View shared research outputs
Top Co-Authors

Avatar

Jung Hee Kim

North Carolina Agricultural and Technical State University

View shared research outputs
Top Co-Authors

Avatar

Junghee Kim

North Carolina Agricultural and Technical State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge