Julian Jang-Jaccard
Cited by
Cited by
A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal
Journal of Computer and System Sciences 80 (5), 973-993, 2014
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies
J Jang-Jaccard, S Nepal, L Alem, J Li
Telemedicine and e-Health 20 (5), 496-504, 2014
Compensation is not enough [fault-handling and compensation mechanism]
P Greenfield, A Fekete, J Jang, D Kuo
Seventh IEEE International Enterprise Distributed Object Computing …, 2003
WebRTC-based video conferencing service for telehealth
J Jang-Jaccard, S Nepal, B Celler, B Yan
Computing 98 (1), 169-193, 2016
A framework for telehealth program evaluation
S Nepal, J Li, J Jang-Jaccard, L Alem
Telemedicine and e-Health 20 (4), 393-404, 2014
The inadequacy of entropy-based ransomware detection
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
International conference on neural information processing, 181-189, 2019
Improving Performance of Autoencoder-based Network Anomaly Detection on NSL-KDD dataset
W Xu, J Jang-Jaccard, A Singh, Y Wei, F Sabrina
IEEE Access 9, 140136 - 140146, 2021
Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia
BG Celler, R Sparks, S Nepal, L Alem, M Varnfield, J Li, J Jang-Jaccard, ...
BMC public health 14 (1), 1-16, 2014
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing
H Alavizadeh, J Jang-Jaccard, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
A cloud architecture of virtual trusted platform modules
D Liu, J Lee, J Jang, S Nepal, J Zic
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
Comprehensive security assessment of combined MTD techniques for the cloud
H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim
Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018
A service-oriented workflow language for robust interacting applications
S Nepal, A Fekete, P Greenfield, J Jang, D Kuo, T Shi
OTM Confederated International Conferences" On the Move to Meaningful …, 2005
A mobile and portable trusted computing platform
S Nepal, J Zic, D Liu, J Jang
EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-19, 2011
Isolation support for service-based applications: A position paper
P Greenfield, A Fekete, J Jang, D Kuo, S Nepal
arXiv preprint cs/0612113, 2006
AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification
Y Wei, J Jang-Jaccard, F Sabrina, A Singh, W Xu, S Camtepe
IEEE Access 9, 146810-146821, 2021
Effective security analysis for combinations of mtd techniques on cloud computing (short paper)
H Alavizadeh, DS Kim, JB Hong, J Jang-Jaccard
International Conference on Information Security Practice and Experience …, 2017
Towards privacy-preserving classification in neural networks
M Baryalai, J Jang-Jaccard, D Liu
2016 14th annual conference on privacy, security and trust (PST), 392-399, 2016
Biometric Enabled Portable Trusted Computing Platform
J Jang, H Hwang, S Nepal
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
An event-driven workflow engine for service-based business systems
J Jang, A Fekete, P Greenfield, S Nepal
2006 10th IEEE International Enterprise Distributed Object Computing …, 2006
Large scale behavioral analysis of ransomware attacks
TR McIntosh, J Jang-Jaccard, PA Watters
International Conference on Neural Information Processing, 217-229, 2018
The system can't perform the operation now. Try again later.
Articles 1–20