Julian Jang-Jaccard
Cited by
Cited by
A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal
Journal of Computer and System Sciences 80 (5), 973-993, 2014
Compensation is not enough [fault-handling and compensation mechanism]
P Greenfield, A Fekete, J Jang, D Kuo
Seventh IEEE International Enterprise Distributed Object Computing …, 2003
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies
J Jang-Jaccard, S Nepal, L Alem, J Li
Telemedicine and e-Health 20 (5), 496-504, 2014
WebRTC-based video conferencing service for telehealth
J Jang-Jaccard, S Nepal, B Celler, B Yan
Computing 98 (1-2), 169-193, 2016
A framework for telehealth program evaluation
S Nepal, J Li, J Jang-Jaccard, L Alem
Telemedicine and e-Health 20 (4), 393-404, 2014
Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia
BG Celler, R Sparks, S Nepal, L Alem, M Varnfield, J Li, J Jang-Jaccard, ...
BMC public health 14 (1), 1-16, 2014
A service-oriented workflow language for robust interacting applications
S Nepal, A Fekete, P Greenfield, J Jang, D Kuo, T Shi
OTM Confederated International Conferences" On the Move to Meaningful …, 2005
A mobile and portable trusted computing platform
S Nepal, J Zic, D Liu, J Jang
EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-19, 2011
A cloud architecture of virtual trusted platform modules
D Liu, J Lee, J Jang, S Nepal, J Zic
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
Biometric Enabled Portable Trusted Computing Platform
J Jang, H Hwang, S Nepal
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
Isolation support for service-based applications: A position paper
P Greenfield, A Fekete, J Jang, D Kuo, S Nepal
arXiv preprint cs/0612113, 2006
An event-driven workflow engine for service-based business systems
J Jang, A Fekete, P Greenfield, S Nepal
2006 10th IEEE International Enterprise Distributed Object Computing …, 2006
Secure virtualization environment based on advanced memory introspection
S Zhang, X Meng, L Wang, L Xu, X Han
Security and Communication Networks 2018, 2018
Comprehensive security assessment of combined MTD techniques for the cloud
H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim
Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018
Effective security analysis for combinations of mtd techniques on cloud computing (short paper)
H Alavizadeh, DS Kim, JB Hong, J Jang-Jaccard
International Conference on Information Security Practice and Experience …, 2017
Delivering promises for web services applications
J Jang, A Fekete, P Greenfield
IEEE International Conference on Web Services (ICWS 2007), 599-606, 2007
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing
H Alavizadeh, J Jang-Jaccard, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Towards a framework for capturing transactional requirements of real workflows
D Kuo, A Fekete, P Greenfield, J Jang
Proceedings of the Second International Workshop on Cooperative Internet …, 2002
Towards privacy-preserving classification in neural networks
M Baryalai, J Jang-Jaccard, D Liu
2016 14th annual conference on privacy, security and trust (PST), 392-399, 2016
Model-based evaluation of combinations of shuffle and diversity MTD techniques on the cloud
H Alavizadeh, DS Kim, J Jang-Jaccard
Future Generation Computer Systems 111, 507-522, 2020
The system can't perform the operation now. Try again later.
Articles 1–20