A survey of emerging threats in cybersecurity J Jang-Jaccard, S Nepal Journal of Computer and System Sciences 80 (5), 973-993, 2014 | 659 | 2014 |
Compensation is not enough [fault-handling and compensation mechanism] P Greenfield, A Fekete, J Jang, D Kuo Seventh IEEE International Enterprise Distributed Object Computing …, 2003 | 120 | 2003 |
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies J Jang-Jaccard, S Nepal, L Alem, J Li Telemedicine and e-Health 20 (5), 496-504, 2014 | 115 | 2014 |
WebRTC-based video conferencing service for telehealth J Jang-Jaccard, S Nepal, B Celler, B Yan Computing 98 (1), 169-193, 2016 | 73 | 2016 |
A framework for telehealth program evaluation S Nepal, J Li, J Jang-Jaccard, L Alem Telemedicine and e-Health 20 (4), 393-404, 2014 | 40 | 2014 |
Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia BG Celler, R Sparks, S Nepal, L Alem, M Varnfield, J Li, J Jang-Jaccard, ... BMC public health 14 (1), 1-16, 2014 | 32 | 2014 |
The inadequacy of entropy-based ransomware detection T McIntosh, J Jang-Jaccard, P Watters, T Susnjak International conference on neural information processing, 181-189, 2019 | 31 | 2019 |
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing H Alavizadeh, J Jang-Jaccard, DS Kim 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 27 | 2018 |
A cloud architecture of virtual trusted platform modules D Liu, J Lee, J Jang, S Nepal, J Zic 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 26 | 2010 |
A service-oriented workflow language for robust interacting applications S Nepal, A Fekete, P Greenfield, J Jang, D Kuo, T Shi OTM Confederated International Conferences" On the Move to Meaningful …, 2005 | 26 | 2005 |
A mobile and portable trusted computing platform S Nepal, J Zic, D Liu, J Jang EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-19, 2011 | 24 | 2011 |
Comprehensive security assessment of combined MTD techniques for the cloud H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018 | 23 | 2018 |
Isolation support for service-based applications: A position paper P Greenfield, A Fekete, J Jang, D Kuo, S Nepal arXiv preprint cs/0612113, 2006 | 23 | 2006 |
Biometric Enabled Portable Trusted Computing Platform J Jang, H Hwang, S Nepal 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 22 | 2011 |
Effective security analysis for combinations of mtd techniques on cloud computing (short paper) H Alavizadeh, DS Kim, JB Hong, J Jang-Jaccard International Conference on Information Security Practice and Experience …, 2017 | 21 | 2017 |
Towards privacy-preserving classification in neural networks M Baryalai, J Jang-Jaccard, D Liu 2016 14th annual conference on privacy, security and trust (PST), 392-399, 2016 | 21 | 2016 |
An event-driven workflow engine for service-based business systems J Jang, A Fekete, P Greenfield, S Nepal 2006 10th IEEE International Enterprise Distributed Object Computing …, 2006 | 21 | 2006 |
Delivering promises for web services applications J Jang, A Fekete, P Greenfield IEEE International Conference on Web Services (ICWS 2007), 599-606, 2007 | 19 | 2007 |
Model-based evaluation of combinations of shuffle and diversity MTD techniques on the cloud H Alavizadeh, DS Kim, J Jang-Jaccard Future Generation Computer Systems 111, 507-522, 2020 | 17 | 2020 |
Large scale behavioral analysis of ransomware attacks TR McIntosh, J Jang-Jaccard, PA Watters International Conference on Neural Information Processing, 217-229, 2018 | 17 | 2018 |