A survey of emerging threats in cybersecurity J Jang-Jaccard, S Nepal Journal of computer and system sciences 80 (5), 973-993, 2014 | 1114 | 2014 |
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies J Jang-Jaccard, S Nepal, L Alem, J Li Telemedicine and e-Health 20 (5), 496-504, 2014 | 161 | 2014 |
Improving Performance of Autoencoder-based Network Anomaly Detection on NSL-KDD dataset W Xu, J Jang-Jaccard, A Singh, Y Wei, F Sabrina IEEE Access 9, 140136 - 140146, 2021 | 139 | 2021 |
Compensation is not enough [fault-handling and compensation mechanism] P Greenfield, A Fekete, J Jang, D Kuo Seventh IEEE International Enterprise Distributed Object Computing …, 2003 | 123 | 2003 |
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset Y Yin, J Jang-Jaccard, W Xu, A Singh, J Zhu, F Sabrina, J Kwak Journal of Big data 10 (1), 15, 2023 | 104 | 2023 |
Deep Q-learning based reinforcement learning approach for network intrusion detection H Alavizadeh, H Alavizadeh, J Jang-Jaccard Computers 11 (3), 41, 2022 | 99 | 2022 |
WebRTC-based video conferencing service for telehealth J Jang-Jaccard, S Nepal, B Celler, B Yan Computing 98 (1), 169-193, 2016 | 99 | 2016 |
AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification Y Wei, J Jang-Jaccard, F Sabrina, A Singh, W Xu, S Camtepe IEEE Access 9, 146810-146821, 2021 | 92 | 2021 |
The inadequacy of entropy-based ransomware detection T McIntosh, J Jang-Jaccard, P Watters, T Susnjak Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019 | 75 | 2019 |
LSTM-autoencoder-based anomaly detection for indoor air quality time-series data Y Wei, J Jang-Jaccard, W Xu, F Sabrina, S Camtepe, M Boulic IEEE Sensors Journal 23 (4), 3787-3800, 2023 | 74 | 2023 |
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification J Zhu, J Jang-Jaccard, A Singh, I Welch, ALS Harith, S Camtepe Computers & Security 117, 102691, 2022 | 57 | 2022 |
A framework for telehealth program evaluation S Nepal, J Li, J Jang-Jaccard, L Alem Telemedicine and e-Health 20 (4), 393-404, 2014 | 51 | 2014 |
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing H Alavizadeh, J Jang-Jaccard, DS Kim 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 42 | 2018 |
Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia BG Celler, R Sparks, S Nepal, L Alem, M Varnfield, J Li, J Jang-Jaccard, ... BMC public health 14, 1-16, 2014 | 34 | 2014 |
Comprehensive security assessment of combined MTD techniques for the cloud H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018 | 33 | 2018 |
Large scale behavioral analysis of ransomware attacks TR McIntosh, J Jang-Jaccard, PA Watters Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018 | 33 | 2018 |
Multi-loss siamese neural network with batch normalization layer for malware detection J Zhu, J Jang-Jaccard, PA Watters IEEE access 8, 171542-171550, 2020 | 32 | 2020 |
A cloud architecture of virtual trusted platform modules D Liu, J Lee, J Jang, S Nepal, J Zic 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 32 | 2010 |
Towards privacy-preserving classification in neural networks M Baryalai, J Jang-Jaccard, D Liu 2016 14th annual conference on privacy, security and trust (PST), 392-399, 2016 | 31 | 2016 |
Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems T Liu, F Sabrina, J Jang-Jaccard, W Xu, Y Wei Sensors 22 (1), 32, 2021 | 29 | 2021 |