关注
Jinsheng Xu
Jinsheng Xu
在 ncat.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Visualization tools for teaching computer security
X Yuan, P Vega, Y Qadah, R Archer, H Yu, J Xu
ACM Transactions on Computing Education (TOCE) 9 (4), 1-28, 2010
522010
A survey of asynchronous collaboration tools
J Xu, J Zhang, T Harvey, J Young
2008 International Conference on Enterprise Information Systems and Web …, 2008
422008
An interactive visualization tool for teaching ARP spoofing attack
B Scott, J Xu, J Zhang, A Brown, E Clark, X Yuan, A Yu, K Williams
2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017
202017
Predicting the performance of synchronous discrete event simulation
J Xu, MJ Chung
IEEE transactions on parallel and distributed systems 15 (12), 1130-1137, 2004
202004
LAN attacker: A visual education tool
T Baxley, J Xu, H Yu, J Zhang, X Yuan, J Brickhouse
Proceedings of the 3rd annual conference on Information security curriculum …, 2006
182006
Performance evaluation of machine learning algorithms in Apache spark for intrusion detection
A Dobson, K Roy, X Yuan, J Xu
2018 28th International Telecommunication Networks and Applications …, 2018
172018
Agent simulation of collaborative knowledge processing in wikipedia
J Xu, L Yilmaz, J Zhang
Proceedings of the 2008 Spring simulation multiconference, 19-25, 2008
172008
Developing and assessing a web-based interactive visualization tool to teach buffer overflow concepts
J Zhang, X Yuan, J Johnson, J Xu, M Vanamala
2020 IEEE Frontiers in Education Conference (FIE), 1-7, 2020
162020
An animated learning tool for Kerberos authentication architecture
X Yuan, Y Qadah, J Xu, H Yu, R Archer, B Chu
Journal of Computing Sciences in Colleges 22 (6), 147-155, 2007
152007
Studying the effects of feature scaling in machine learning
H Alshaher
North Carolina Agricultural and Technical State University, 2021
142021
Teaching cybersecurity using guided inquiry collaborative learning
X Yuan, T Zhang, AA Shama, J Xu, L Yang, J Ellis, W He, C Waters
2019 IEEE Frontiers in Education Conference (FIE), 1-6, 2019
142019
Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III
C Faust, G Dozier, J Xu, MC King
2017 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2017
142017
Teaching mobile computing and mobile security
X Yuan, K Williams, S McCrickard, C Hardnett, LH Lineberry, K Bryant, ...
2016 IEEE Frontiers in Education Conference (FIE), 1-6, 2016
142016
A study on community formation in collaborative tagging systems
C Dichev, J Xu, D Dicheva, J Zhang
2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008
142008
A survey of security standards applicable to health information systems
F Akowuah, X Yuan, J Xu, H Wang
International Journal of Information Security and Privacy (IJISP) 7 (4), 22-36, 2013
132013
Authorship attribution via evolutionary hybridization of sentiment analysis, LIWC, and topic modeling features
J Gaston, M Narayanan, G Dozier, DL Cothran, C Arms-Chavez, M Rossi, ...
2018 IEEE Symposium Series on Computational Intelligence (SSCI), 933-940, 2018
122018
Authorship attribution vs. adversarial authorship from a liwc and sentiment analysis perspective
J Gaston, M Narayanan, G Dozier, DL Cothran, C Arms-Chavez, M Rossi, ...
2018 IEEE symposium series on computational intelligence (SSCI), 920-927, 2018
122018
Using packet sniffer simulator in the class: Experience and evaluation
X Yuan, P Vega, J Xu, H Yu, Y Li
Proceedings of the 45th annual southeast regional conference, 116-121, 2007
122007
Teaching a web security course to practice information assurance
H Yu, W Liao, X Yuan, J Xu
Proceedings of the 37th SIGCSE technical symposium on Computer science …, 2006
122006
Enhancing cybersecurity education using POGIL
X Yuan, L Yang, W He, JT Ellis, J Xu, CK Waters
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
112017
系统目前无法执行此操作,请稍后再试。
文章 1–20