Visualization tools for teaching computer security X Yuan, P Vega, Y Qadah, R Archer, H Yu, J Xu ACM Transactions on Computing Education (TOCE) 9 (4), 1-28, 2010 | 52 | 2010 |
A survey of asynchronous collaboration tools J Xu, J Zhang, T Harvey, J Young 2008 International Conference on Enterprise Information Systems and Web …, 2008 | 42 | 2008 |
An interactive visualization tool for teaching ARP spoofing attack B Scott, J Xu, J Zhang, A Brown, E Clark, X Yuan, A Yu, K Williams 2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017 | 20 | 2017 |
Predicting the performance of synchronous discrete event simulation J Xu, MJ Chung IEEE transactions on parallel and distributed systems 15 (12), 1130-1137, 2004 | 20 | 2004 |
LAN attacker: A visual education tool T Baxley, J Xu, H Yu, J Zhang, X Yuan, J Brickhouse Proceedings of the 3rd annual conference on Information security curriculum …, 2006 | 18 | 2006 |
Performance evaluation of machine learning algorithms in Apache spark for intrusion detection A Dobson, K Roy, X Yuan, J Xu 2018 28th International Telecommunication Networks and Applications …, 2018 | 17 | 2018 |
Agent simulation of collaborative knowledge processing in wikipedia J Xu, L Yilmaz, J Zhang Proceedings of the 2008 Spring simulation multiconference, 19-25, 2008 | 17 | 2008 |
Developing and assessing a web-based interactive visualization tool to teach buffer overflow concepts J Zhang, X Yuan, J Johnson, J Xu, M Vanamala 2020 IEEE Frontiers in Education Conference (FIE), 1-7, 2020 | 16 | 2020 |
An animated learning tool for Kerberos authentication architecture X Yuan, Y Qadah, J Xu, H Yu, R Archer, B Chu Journal of Computing Sciences in Colleges 22 (6), 147-155, 2007 | 15 | 2007 |
Studying the effects of feature scaling in machine learning H Alshaher North Carolina Agricultural and Technical State University, 2021 | 14 | 2021 |
Teaching cybersecurity using guided inquiry collaborative learning X Yuan, T Zhang, AA Shama, J Xu, L Yang, J Ellis, W He, C Waters 2019 IEEE Frontiers in Education Conference (FIE), 1-6, 2019 | 14 | 2019 |
Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III C Faust, G Dozier, J Xu, MC King 2017 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2017 | 14 | 2017 |
Teaching mobile computing and mobile security X Yuan, K Williams, S McCrickard, C Hardnett, LH Lineberry, K Bryant, ... 2016 IEEE Frontiers in Education Conference (FIE), 1-6, 2016 | 14 | 2016 |
A study on community formation in collaborative tagging systems C Dichev, J Xu, D Dicheva, J Zhang 2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008 | 14 | 2008 |
A survey of security standards applicable to health information systems F Akowuah, X Yuan, J Xu, H Wang International Journal of Information Security and Privacy (IJISP) 7 (4), 22-36, 2013 | 13 | 2013 |
Authorship attribution via evolutionary hybridization of sentiment analysis, LIWC, and topic modeling features J Gaston, M Narayanan, G Dozier, DL Cothran, C Arms-Chavez, M Rossi, ... 2018 IEEE Symposium Series on Computational Intelligence (SSCI), 933-940, 2018 | 12 | 2018 |
Authorship attribution vs. adversarial authorship from a liwc and sentiment analysis perspective J Gaston, M Narayanan, G Dozier, DL Cothran, C Arms-Chavez, M Rossi, ... 2018 IEEE symposium series on computational intelligence (SSCI), 920-927, 2018 | 12 | 2018 |
Using packet sniffer simulator in the class: Experience and evaluation X Yuan, P Vega, J Xu, H Yu, Y Li Proceedings of the 45th annual southeast regional conference, 116-121, 2007 | 12 | 2007 |
Teaching a web security course to practice information assurance H Yu, W Liao, X Yuan, J Xu Proceedings of the 37th SIGCSE technical symposium on Computer science …, 2006 | 12 | 2006 |
Enhancing cybersecurity education using POGIL X Yuan, L Yang, W He, JT Ellis, J Xu, CK Waters Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017 | 11 | 2017 |