Prof. YUE Wei Thoo (余偉圖)
Research Output
- 2012
- Published
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Chau, M., Wang, A. G., Yue, W. T. & Chen, H., 2012, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7299 LNCSResearch output: Journal Publications and Reviews › Editorial Preface
Scopus citations: 1 - Published
Preface
Shaw, M. J., Zhang, D. & Yue, W. T., 2012, In: Lecture Notes in Business Information Processing. 108 LNBIPResearch output: Journal Publications and Reviews › Editorial Preface
- 2011
- Published
Live-chat agent assignments to heterogeneous E-customers under imperfect classification
Goes, P., Ilk, N., Yue, W. T. & Zhao, J. L., Dec 2011, In: ACM Transactions on Management Information Systems. 2, 4, 24.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 14 - Published
Managing Information Security under Continuous Drift and Sudden Shocks
Mookerjee, R., Mookerjee, V., YUE, W. T. & Bensoussan, A., 12 Nov 2011.Research output: Conference Papers › RGC 32 - Refereed conference paper (without host publication) › peer-review
- Published
When hackers talk: Managing information security under variable attack rates and knowledge dissemination
Mookerjee, V., Mookerjee, R., Bensoussan, A. & Yue, W. T., Sept 2011, In: Information Systems Research. 22, 3, p. 606-623Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 64 - 2010
- Published
Live-chat Agent Assignments in Two-Class e-Customer Queues under Imprecise Profiling
GOES, P., Ilk, N., YUE, W. T. & ZHAO, L., 11 Dec 2010.Research output: Conference Papers › RGC 32 - Refereed conference paper (without host publication) › peer-review
- Published
A cost-based analysis of intrusion detection system configuration under active or passive response
Yue, W. T. & Çakanyildirim, M., Dec 2010, In: Decision Support Systems. 50, 1, p. 21-31Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 13 - Published
Co-development of software and community formation
Feng, J., YUE, W. T. & Zhao, L., 19 Jun 2010.Research output: Conference Papers › RGC 32 - Refereed conference paper (without host publication) › peer-review
- Published
Live-chat agent assignments in two-class e-customer queues under imperfect profiling
Goes, P., Ilk, N., Yue, W. T. & Zhao, J. L., 2010, Proceedings of 20th Annual Workshop on Information Technologies and Systems. Social Science Research NetworkResearch output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 1 - 2009
The management of intrusion detection: Configuration, inspection, and investment
Çakanyildirim, M., Yue, W. T. & Ryu, Y. U., 16 May 2009, In: European Journal of Operational Research. 195, 1, p. 186-204Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 7Maintaining Diagnostic knowledge-based systems: A control-theoretic approach
Bensoussan, A., Mookerjee, R., Mookerjee, V. & Yue, W. T., Feb 2009, In: Management Science. 55, 2, p. 294-310Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 15- 2008
Decision-Theoretic and game-theoretic approaches to IT security investment
Cavusoglu, H., Raghunathan, S. & Yue, W. T., 2008, In: Journal of Management Information Systems. 25, 2, p. 281-304Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 182On a multi-dimensional framework for information security management
Bensoussan, A., Mookerjee, R., Mookerjee, V. & Yue, W. T., 2008, 2008 Workshop on Information Technologies and Systems, WITS 2008. Social Science Research Network, p. 169-175Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
- 2007
Network externalities, layered protection and IT security risk management
Yue, W. T., Çakanyildirim, M., Ryu, Y. U. & Liu, D., Nov 2007, In: Decision Support Systems. 44, 1, p. 1-16Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 42Guest editorial: The Internet and outsourcing
Gupta, A., Seshasai, S., Arnett, K., Bertino, E., Chen, P., Fan, P., Gupta, M., & 16 others , 1 Aug 2007, In: ACM Transactions on Internet Technology. 7, 3, 1275506.Research output: Journal Publications and Reviews › Editorial Preface
Intrusion prevention in information systems: Reactive and proactive responses
Yue, W. T. & Çakanyildirim, M., Jun 2007, In: Journal of Management Information Systems. 24, 1, p. 329-353Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 51- 2006
Maintaining knowledge-based systems against adversarial attacks: A differential game approach
Yue, W. T., Mookerjee, R., Mookerjee, V. & Bensoussan, A., 2006, 16th Workshop on Information Technologies and Systems, WITS 2006. Social Science Research Network, p. 91-96Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
- 2005
Firm bankruptcy prediction: Experimental comparison of isotonic separation and other classification approaches
Ryu, Y. U. & Yue, W. T., Sept 2005, In: IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans. 35, 5, p. 727-737Research output: Journal Publications and Reviews › RGC 22 - Publication in policy or professional journal
Scopus citations: 41Maintaining a diagnostic knowledge-based system: A control theoretic approach
Mookerjee, R., Mookerjee, V. & Yue, W. T., 2005, 15th Workshop on Information Technology and Systems, WITS 2005. University of Arizona, p. 87-92Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
- 2004
IT security risk management under network effects and layered protection strategy
Yue, W. T., Cakanyildirim, M., Ryu, Y. U. & Liu, D., 2004, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3073, p. 331-348Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review