팔로우
Julian Jang-Jaccard
제목
인용
인용
연도
A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal
Journal of Computer and System Sciences 80 (5), 973-993, 2014
6312014
Compensation is not enough [fault-handling and compensation mechanism]
P Greenfield, A Fekete, J Jang, D Kuo
Seventh IEEE International Enterprise Distributed Object Computing …, 2003
1202003
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies
J Jang-Jaccard, S Nepal, L Alem, J Li
Telemedicine and e-Health 20 (5), 496-504, 2014
1162014
WebRTC-based video conferencing service for telehealth
J Jang-Jaccard, S Nepal, B Celler, B Yan
Computing 98 (1), 169-193, 2016
712016
A framework for telehealth program evaluation
S Nepal, J Li, J Jang-Jaccard, L Alem
Telemedicine and e-Health 20 (4), 393-404, 2014
412014
Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia
BG Celler, R Sparks, S Nepal, L Alem, M Varnfield, J Li, J Jang-Jaccard, ...
BMC public health 14 (1), 1-16, 2014
312014
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing
H Alavizadeh, J Jang-Jaccard, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
272018
The inadequacy of entropy-based ransomware detection
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
International Conference on Neural Information Processing, 181-189, 2019
262019
A service-oriented workflow language for robust interacting applications
S Nepal, A Fekete, P Greenfield, J Jang, D Kuo, T Shi
OTM Confederated International Conferences" On the Move to Meaningful …, 2005
262005
A cloud architecture of virtual trusted platform modules
D Liu, J Lee, J Jang, S Nepal, J Zic
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
252010
A mobile and portable trusted computing platform
S Nepal, J Zic, D Liu, J Jang
EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-19, 2011
242011
Comprehensive security assessment of combined MTD techniques for the cloud
H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim
Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018
222018
Effective security analysis for combinations of mtd techniques on cloud computing (short paper)
H Alavizadeh, DS Kim, JB Hong, J Jang-Jaccard
International Conference on Information Security Practice and Experience …, 2017
222017
Biometric Enabled Portable Trusted Computing Platform
J Jang, H Hwang, S Nepal
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
222011
Isolation support for service-based applications: A position paper
P Greenfield, A Fekete, J Jang, D Kuo, S Nepal
arXiv preprint cs/0612113, 2006
222006
An event-driven workflow engine for service-based business systems
J Jang, A Fekete, P Greenfield, S Nepal
2006 10th IEEE International Enterprise Distributed Object Computing …, 2006
212006
Towards privacy-preserving classification in neural networks
M Baryalai, J Jang-Jaccard, D Liu
2016 14th annual conference on privacy, security and trust (PST), 392-399, 2016
202016
Model-based evaluation of combinations of shuffle and diversity MTD techniques on the cloud
H Alavizadeh, DS Kim, J Jang-Jaccard
Future Generation Computer Systems 111, 507-522, 2020
182020
Delivering promises for web services applications
J Jang, A Fekete, P Greenfield
IEEE International Conference on Web Services (ICWS 2007), 599-606, 2007
182007
Large scale behavioral analysis of ransomware attacks
TR McIntosh, J Jang-Jaccard, PA Watters
International Conference on Neural Information Processing, 217-229, 2018
162018
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20