Julian Jang-Jaccard
Julian Jang-Jaccard
Cyber-Defence Campus, armasuisse S+T, Swiss Federal Department of Defense
Verified email at
Cited by
Cited by
A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal
Journal of computer and system sciences 80 (5), 973-993, 2014
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies
J Jang-Jaccard, S Nepal, L Alem, J Li
Telemedicine and e-Health 20 (5), 496-504, 2014
Improving Performance of Autoencoder-based Network Anomaly Detection on NSL-KDD dataset
W Xu, J Jang-Jaccard, A Singh, Y Wei, F Sabrina
IEEE Access 9, 140136 - 140146, 2021
Compensation is not enough [fault-handling and compensation mechanism]
P Greenfield, A Fekete, J Jang, D Kuo
Seventh IEEE International Enterprise Distributed Object Computing …, 2003
WebRTC-based video conferencing service for telehealth
J Jang-Jaccard, S Nepal, B Celler, B Yan
Computing 98 (1), 169-193, 2016
Deep Q-learning based reinforcement learning approach for network intrusion detection
H Alavizadeh, H Alavizadeh, J Jang-Jaccard
Computers 11 (3), 41, 2022
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset
Y Yin, J Jang-Jaccard, W Xu, A Singh, J Zhu, F Sabrina, J Kwak
Journal of Big data 10 (1), 15, 2023
AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification
Y Wei, J Jang-Jaccard, F Sabrina, A Singh, W Xu, S Camtepe
IEEE Access 9, 146810-146821, 2021
The inadequacy of entropy-based ransomware detection
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
LSTM-autoencoder-based anomaly detection for indoor air quality time-series data
Y Wei, J Jang-Jaccard, W Xu, F Sabrina, S Camtepe, M Boulic
IEEE Sensors Journal 23 (4), 3787-3800, 2023
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification
J Zhu, J Jang-Jaccard, A Singh, I Welch, ALS Harith, S Camtepe
Computers & Security 117, 102691, 2022
A framework for telehealth program evaluation
S Nepal, J Li, J Jang-Jaccard, L Alem
Telemedicine and e-Health 20 (4), 393-404, 2014
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing
H Alavizadeh, J Jang-Jaccard, DS Kim
2018 17th IEEE international conference on trust, security and privacy in …, 2018
Large scale behavioral analysis of ransomware attacks
TR McIntosh, J Jang-Jaccard, PA Watters
Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018
Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia
BG Celler, R Sparks, S Nepal, L Alem, M Varnfield, J Li, J Jang-Jaccard, ...
BMC public health 14, 1-16, 2014
Multi-loss siamese neural network with batch normalization layer for malware detection
J Zhu, J Jang-Jaccard, PA Watters
IEEE access 8, 171542-171550, 2020
A cloud architecture of virtual trusted platform modules
D Liu, J Lee, J Jang, S Nepal, J Zic
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
Comprehensive security assessment of combined MTD techniques for the cloud
H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim
Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018
Towards privacy-preserving classification in neural networks
M Baryalai, J Jang-Jaccard, D Liu
2016 14th annual conference on privacy, security and trust (PST), 392-399, 2016
Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems
T Liu, F Sabrina, J Jang-Jaccard, W Xu, Y Wei
Sensors 22 (1), 32, 2021
The system can't perform the operation now. Try again later.
Articles 1–20