Journal
Lee, M., Kim, DH., Jang-Jaccard, J., & Kwak, J. (2023). Blended threat prediction based on knowledge graph embedding in the IoBE.
ICT Express.
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Dunmore, A., Dunning, A., Jang-Jaccard, J., Sabrina, F., & Kwak, J. (2023). MAGNETO and DeepInsight: Extended Image Translation with Semantic Relationships for Classifying Attack Data with Machine Learning Models.
Electronics (Switzerland). 12(16)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Dunmore, A., Jang-Jaccard, J., Sabrina, F., & Kwak, J. (2023). A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection.
IEEE Access. 11, 76071-76094
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Zhu, J., Jang-Jaccard, J., Singh, A., Watters, PA., & Camtepe, S. (2023). Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware.
Future Internet. 15(6)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

John, TC., Abbasi, MS., Al-Sahaf, H., Welch, I., & Jang-Jaccard, J. (2023). Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution.
Computers and Security. 129
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

view more...
Yin, Y., Jang-Jaccard, J., Xu, W., Singh, A., Zhu, J., Sabrina, F., . . . Kwak, J. (2023). IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset.
Journal of Big Data. 10(1)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Wei, Y., Jang-Jaccard, J., Xu, W., Sabrina, F., Camtepe, S., & Boulic, M. (2023). LSTM-Autoencoder-Based Anomaly Detection for Indoor Air Quality Time-Series Data.
IEEE Sensors Journal. 23(4), 3787-3800
[Journal article]Authored by: Boulic, M., Jang-Jaccard, J.Read Online:

Read Abstract:

Alavizadeh, H., Jang-Jaccard, J., Enoch, SY., Al-Sahaf, H., Welch, I., Camtepe, SA., . . . Kim, DD. (2022). A Survey on Cyber Situation-Awareness Systems: Framework, Techniques, and Insights.
ACM Computing Surveys. 55(5)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Lee, M., Jang-Jaccard, J., & Kwak, J. (2022). Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment.
Computers, Materials and Continua. 73(1), 199-223
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Xu, W., Jang-Jaccard, J., Liu, T., Sabrina, F., & Kwak, J. (2022). Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier.
Computers. 11(6)
[Journal article]Authored by: Jang-Jaccard, J., Liu, T.Read article at Massey Research Online:

Read Online:

Read Abstract:

Alavizadeh, H., Aref, S., Kim, DS., & Jang-Jaccard, J. (2022). Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud.
IEEE Transactions on Emerging Topics in Computing. 10(4), 1772-1788
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Zhu, J., Jang-Jaccard, J., Singh, A., Welch, I., AI-Sahaf, H., & Camtepe, S. (2022). A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Computers and Security. 117
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Alavizadeh, H., Alavizadeh, H., & Jang-Jaccard, J. (2022). Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection.
Computers. 11(3)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Feng, S., Liu, Q., Patel, A., Bazai, SU., Jin, CK., Kim, JS., . . . Wilson, B. (2022). Automated pneumothorax triaging in chest X-rays in the New Zealand population using deep-learning algorithms.
Journal of Medical Imaging and Radiation Oncology. 66(8), 1035-1043
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Bazai, SU., Jang-Jaccard, J., & Alavizadeh, H. (2022). A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark.
ACM Transactions on Privacy and Security. 25(1)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Liu, T., Sabrina, F., Jang-Jaccard, J., Xu, W., & Wei, Y. (2022). Artificial intelligence-enabled ddos detection for blockchain-based smart transport systems.
Sensors. 22(1)
[Journal article]Authored by: Jang-Jaccard, J., Liu, T.Read article at Massey Research Online:

Read Online:

Read Abstract:

Wei, Y., Jang-Jaccard, J., Sabrina, F., Singh, A., Xu, W., & Camtepe, S. (2021). AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification.
IEEE Access. 9, 146810-146821
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Xu, W., Jang-Jaccard, J., Singh, A., Wei, Y., & Sabrina, F. (2021). Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset.
IEEE Access. 9, 140136-140146
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Sabrina, F., & Jang-Jaccard, J. (2021). Entitlement-based access control for smart cities using blockchain.
Sensors. 21(16)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Bazai, SU., Jang-Jaccard, J., & Alavizadeh, H. (2021). Scalable, high-performance, and generalized subtree data anonymization approach for apache spark.
Electronics (Switzerland). 10(5), 1-28
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Zhu, J., Jang-Jaccard, J., Liu, T., & Zhou, J. (2021). Joint Spectral Clustering based on Optimal Graph and Feature Selection.
Neural Processing Letters. 53(1), 257-273
[Journal article]Authored by: Jang-Jaccard, J., Liu, T.Read article at Massey Research Online:

Read Online:

Read Abstract:

Alavizadeh, H., Hong, JB., Kim, DS., & Jang-Jaccard, J. (2021). Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud.
Computers and Security. 102
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Wei, Y., Jang-Jaccard, J., Sabrina, F., & Alavizadeh, H. (2020). Large-Scale Outlier Detection for Low-Cost PM Sensors.
IEEE Access. 8, 229033-229042
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Bazai, SU., & Jang-Jaccard, J. (2020). In-memory data anonymization using scalable and high performance rdd design.
Electronics (Switzerland). 9(10), 1-26
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Zhu, J., Jang-Jaccard, J., & Watters, PA. (2020). Multi-loss Siamese neural network with batch normalization layer for malware detection.
IEEE Access. 8, 171542-171550
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Alavizadeh, H., Kim, DS., & Jang-Jaccard, J. (2020). Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud.
Future Generation Computer Systems. 111, 507-522
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

McIntosh, T., Jang-Jaccard, J., Watters, P., & Susnjak, T. (2019). Masquerade Attacks Against Security Software Exclusion Lists.
Australian Journal of Intelligent Information Processing Systems. 16(4), 1-1 Retrieved from http://ajiips.com.au/
[Journal article]Authored by: Jang-Jaccard, J., Susnjak, T.Read article at Massey Research Online:

Zhang, X., Jang-Jaccard, J., Qi, L., Bhuiyan, MZA., & Liu, C. (2018). Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.
Security and Communication Networks. 2018
[Journal article]Authored by: Jang-Jaccard, J.Edited by: Jang-Jaccard, J.Read Online:

Nepal, S., Friedrich, C., Wise, C., Sinnott, RO., Jang-Jaccard, J., & Chen, S. (2016). Key management service: Enabling secure sharing and deleting of documents on public clouds.
Services Transactions on Cloud Computing. 4(2), 15-31
[Journal article]Authored by: Jang-Jaccard, J.Read article at Massey Research Online:

Read Abstract:

Jang-Jaccard, J., Nepal, S., Celler, B., & Yan, B. (2016). WebRTC-based video conferencing service for telehealth.
Computing. 98(1-2), 169-193
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity.
Journal of Computer and System Sciences. 80(5), 973-993
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Nepal, S., Li, J., Jang-Jaccard, J., & Alem, L. (2014). A framework for telehealth program evaluation.
Telemedicine and e-Health. 20(4), 393-404
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang-Jaccard, J., Nepal, S., Alem, L., & Li, J. (2014). Barriers for delivering telehealth in rural australia: a review based on Australian trials and studies.
Telemedicine journal and e-health : the official journal of the American Telemedicine Association. 20(5), 496-504
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Celler, BG., Sparks, R., Nepal, S., Alem, L., Varnfield, M., Li, J., . . . Jayasena, R. (2014). Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in australia.
BMC Public Health. 14(1)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang-Jaccard, J., Nepal, S., & GUO, YJ. (2013). Cybersecurity threats in cloud computing.
Australian Journal of Telecommunications and the Digital Economy. 1(1), 4.1-4.17 Retrieved from http://telsoc.org/journal
[Journal article]Authored by: Jang-Jaccard, J.Read article at Massey Research Online:

Read Online:

Zic, JJ., De Groot, M., Liu, D., Jang, J., & Wang, C. (2012). Hardware security device facilitated trusted energy services.
Mobile Networks and Applications. 17(4), 564-577
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Liu, D., Lee, J., Jang, J., Nepal, S., & Zic, J. (2012). A new cloud architecture of virtual trusted platform modules.
IEICE Transactions on Information and Systems. E95-D(6), 1577-1589
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Nepal, S., Zic, J., Liu, D., & Jang, J. (2011). A mobile and portable trusted computing platform.
Eurasip Journal on Wireless Communications and Networking. 2011(1)
[Journal article]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

view less...
Conference
Yin, Y., Jang-Jaccard, J., Sabrina, F., & Kwak, J.Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset.
Proceedings of the 2023 26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023. (pp. 423 - 431).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Lee, M., Jung, IS., Kim, DH., Jang-Jaccard, J., & Kwak, J.Applicability Analysis of Knowledge Graph Embedding on Blended Threat.
2022 International Conference on Platform Technology and Service, PlatCon 2022 - Proceedings. (pp. 48 - 52).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Yin, Y., Jang-Jaccard, J., & Baghaei, N.PassImg: A Secure Password Generation and Management Scheme without Storing.
2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022. (pp. 341 - 346).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Wei, Y., Jang-Jaccard, J., Sabrina, F., & McIntosh, T.MSD-Kmeans: A Hybrid Algorithm for Efficient Detection of Global and Local Outliers.
Proceedings - 2021 IEEE 15th International Conference on Big Data Science and Engineering, BigDataSE 2021. (pp. 87 - 94).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Alavizadeh, H., Alavizadeh, H., & Jang-Jaccard, J.Cyber situation awareness monitoring and proactive response for enterprises on the cloud.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. (pp. 1276 - 1284).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

view more...
Alavizadeh, H., Alavizadeh, H., Kim, DS., Jang-Jaccard, J., & Torshiz, MN.An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 150 - 164). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jean Camp, L., Grobler, M., Jang-Jaccard, J., Probst, C., Renaud, K., & Watters, P.Conceptualizing human resilience in the face of the global epidemiology of cyber attacks.
Proceedings of the Annual Hawaii International Conference on System Sciences. (pp. 4763 - 4772). 1530-1605.
[Conference]Authored by: Jang-Jaccard, J.Read Abstract:

McIntosh, T., Jang-Jaccard, J., Watters, P., & Susnjak, T.The Inadequacy of Entropy-Based Ransomware Detection.
Communications in Computer and Information Science. (pp. 181 - 189). 1865-0929.
[Conference]Authored by: Jang-Jaccard, J., Susnjak, T.Read Online:

Read Abstract:

Bazai, SU., & Jang-Jaccard, J.SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 646 - 662). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Boulic, M., Wang, Y., Phipps, R., Chitty, C., Cunningham, C., Moses, A., . . . Palfroy, C.A breath of fresh air: Engaging school-aged students with air quality science in New Zealand schools.
15th Conference of the International Society of Indoor Air Quality and Climate, INDOOR AIR 2018.
[Conference]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J., Page, W.Read Abstract:

Wang, Y., Jang-Jaccard, J., Boulic, M., Phipps, R., Chitty, C., Weyers, R., . . . Team, HSR.Deployment Issues for Integrated Open-Source-ased Indoor Air Quality School Monitoring Box (SKOMOBO).
2018 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS). (pp. 259 - 262).
[Conference]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.
McIntosh, TR., Jang-Jaccard, J., & Watters, PA.Large scale behavioral analysis of ransomware attacks.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 217 - 229). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Alavizadeh, H., Hong, JB., Jang-Jaccard, J., & Kim, DS.Comprehensive security assessment of combined MTD techniques for the cloud.
Proceedings of the ACM Conference on Computer and Communications Security. (pp. 11 - 20). 1543-7221.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Alavizadeh, H., Jang-Jaccard, J., & Kim, DS.Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing.
Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. (pp. 573 - 578).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Wang, Y., Jang-Jaccard, J., Boulic, M., Phipps, R., Chitty, C., Weyers, R., . . . Cunningham, C.Deployment issues for integrated open-source-Based indoor air quality school Monitoring Box (SKOMOBO).
2018 IEEE Sensors Applications Symposium, SAS 2018 - Proceedings. (pp. 1 - 4).
[Conference]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.Read Online:

Read Abstract:

Bazai, SU., Jang-Jaccard, J., & Wang, R.Anonymizing k-NN classification on mapreduce.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. (pp. 364 - 377). 1867-8211.
[Conference]Authored by: Jang-Jaccard, J., Wang, R.Read Online:

Read Abstract:

Weyers, R., Jang-Jaccard, J., Moses, A., Wang, Y., Boulic, M., Chitty, C., . . . Cunningham, C. (2018). Low-cost Indoor Air Quality (IAQ) Platform for Healthier Classrooms in New Zealand: Engineering Issues.
Proceedings - 2017 4th Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2017. (pp. 208 - 215).
[Conference Paper in Published Proceedings]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.Read Abstract:

Boulic, M., Wang, Y., Phipps, R., Chitty, C., Cunningham, C., Moses, A., . . . Healthy School Research Team, . (2018). A breath of fresh air: engaging school-aged students with air quality science in New Zealand schools.. , Indoor Air 2018
[Conference Abstract]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.Contributed to by: Tookey, L.Edited by: Tookey, L.Read Abstract:

Wang, Y., Boulic, M., Phipps, R., Chitty, C., Moses, A., Weyers, R., . . . Cunningham, C.(2018).
Integrating Open-Source Technologies to Build a School Indoor Air Quality Monitoring Box (SKOMOBO). Paper presented at the meeting of Proceedings - 2017 4th Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2017
[Conference Paper]Authored by: Boulic, M., Cunningham, C., Jang-Jaccard, J.Read Abstract:

Alavizadeh, H., Kim, DS., Hong, JB., & Jang-Jaccard, J.Effective security analysis for combinations of MTD techniques on cloud computing (short paper).
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 539 - 548). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Alavizadeh, H., Alavizadeh, H., Dube, K., Kim, DS., Jang-Jaccard, J., & Guesgen, HW. (2017). A secure server-based pseudorandom number generator protocol for mobile devices.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10701 LNCS (pp. 860 - 876).
[Conference Paper in Published Proceedings]Authored by: Guesgen, H., Jang-Jaccard, J.Read Online:

Read Abstract:

Bazai, SU., Jang-Jaccard, J., & Zhang, X.A privacy preserving platform for MapReduce.
Communications in Computer and Information Science. (pp. 88 - 99). 1865-0929.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Baryalai, M., Jang-Jaccard, J., & Liu, D.Towards privacy-preserving classification in neural networks.
2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. (pp. 392 - 399).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Nepal, S., Jang-Jaccard, J., Celler, B., Yan, B., & Alem, L.Data architecture for telehealth services research: A case study of home tele-monitoring.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. (pp. 458 - 467).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang-Jaccard, J., Li, J., Nepal, S., & Alem, L.Security analysis of mobile applications: A case study of a collaboration tool in healthcare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. (pp. 553 - 562).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang-Jaccard, J., Manraj, A., & Nepal, S.Portable key management service for cloud storage.
CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. (pp. 147 - 156).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang, J., Hwang, H., & Nepal, S.Biometric enabled portable trusted computing platform.
Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011. (pp. 436 - 442).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Zic, J., Jang, J., Liu, D., Wang, C., & De Groot, M.Hardware security device facilitated trusted residential energy services.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010.
[Conference]Authored by: Jang-Jaccard, J.Read Abstract:

Liu, D., Lee, J., Jang, J., Nepal, S., & Zic, J.A cloud architecture of virtual trusted platform modules.
Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. (pp. 804 - 811).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Nepal, S., Zic, J., Liu, D., & Jang, J.Trusted computing platform in your pocket.
Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. (pp. 812 - 817).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang, J., Liu, D., Nepal, S., & Zic, J.User authentication for online applications using a USB-based trust device.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. (pp. 15 - 26). 1867-8211.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang, J., Nepal, S., & Zic, J.A trust enhanced email application using Trusted Computing.
UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. (pp. 502 - 507).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Chen, W., Fekete, A., Greenfield, P., & Jang, J.Implementing isolation for service-based applications.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5870 LNCS
(PART 1)(pp. 365 - 372). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang, J., Nepal, S., & Zic, J.Trusted email protocol: Dealing with privacy concerns from malicious email intermediaries.
Proceedings - 2008 IEEE 8th International Conference on Computer and Information Technology, CIT 2008. (pp. 402 - 407).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Nepal, S., Julian, J., & John, Z.Anitya: An ephemeral data management service and secure data access protocols for dynamic collaborations.
Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings. (pp. 219 - 226).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Nepal, S., Zic, J., & Jang, J.A policy based approach to managing shared data in dynamic collaborations.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4804 LNCS
(PART 2)(pp. 1296 - 1303). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang, J., Fekete, A., & Greenfield, P.Delivering promises for web services applications.
Proceedings - 2007 IEEE International Conference on Web Services, ICWS 2007. (pp. 599 - 606).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Greenfield, P., Fekete, A., Jang, J., Kuo, D., & Nepal, S.Isolation support for service-based applications a position paper.
CIDR 2007 - 3rd Biennial Conference on Innovative Data Systems Research. (pp. 314 - 323).
[Conference]Authored by: Jang-Jaccard, J.Read Abstract:

Nepal, S., Jang, J., & Zie, J.Anitya: An ephemeral data management service and secure data access protocols for dynamic collaborations.
EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS. (pp. 219 - 226).
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Jang, J., Nepal, S., & Zic, J.Establishing a trust relationship in cooperative information systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 426 - 443). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang, J., Fekete, A., Greenfield, P., & Nepal, S.An event-driven workflow engine for service-based business systems.
Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC. (pp. 233 - 242). 1541-7719.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Nepal, S., Fekete, A., Greenfield, P., Jang, J., Kuo, D., & Shi, T.A service-oriented workflow language for robust interacting applications.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 40 - 58). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Kuo, D., Fekete, A., Greenfield, P., & Jang, JL.Towards a transactional framework derived from real workflows.
COOPERATIVE INTERNET COMPUTING. (pp. 201 - 220).
[Conference]Authored by: Jang-Jaccard, J.
Greenfield, P., Fekete, A., Jang, J., & Kuo, D.Compensation is not enough [fault-handling and compensation mechanism].
Proceedings - 7th IEEE International Enterprise Distributed Object Computing Conference. 2003-January
(January)(pp. 232 - 239). 1541-7719.
[Conference]Authored by: Jang-Jaccard, J.Read Online:

Read Abstract:

Jang, J., Fekete, A., Greenfield, P., & Kuo, D.Expressiveness of workflow description languages.
Proceedings of the International Conference on Web Services. (pp. 104 - 110).
[Conference]Authored by: Jang-Jaccard, J.Read Abstract:

Kuo, D., Fekete, A., Greenfield, P., Jang, J., & Palmer, D.Just What Could Possibly Go Wrong in B2B Integration?.
Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. (pp. 544 - 549). 0730-3157.
[Conference]Authored by: Jang-Jaccard, J.Read Abstract:
