A New Cloud Architecture of Virtual Trusted Platform Modules

Dongxi LIU , Jack LEE , Julian JANG , Surya NEPAL
IEICE Transactions on Information and Systems 95 ( 6) 1577 -1589

1
2012
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries

Julian Jang , Surya Nepal , John Zic
computer and information technology 402 -407

10
2008
Automated pneumothorax triaging in chest X‐rays in the New Zealand population using deep‐learning algorithms

Sijing Feng , Qixiu Liu , Aakash Patel , Sibghat Ullah Bazai
Journal of medical imaging and radiation oncology 66 ( 8) 1035 -1043

22
2022
6
2012
Masquerade attacks against security software exclusion lists

Paul A. Watters , Teo Susnjak , Julian Jang-Jaccard , Timothy R. McIntosh
Aust. J. Intell. Inf. Process. Syst. 16 1 -8

1
2019
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud

Julian Jang-Jaccard , Hooman Alavizadeh , Hootan Alavizadeh
trust security and privacy in computing and communications 1276 -1284

2020
Scalable, High-Performance, and Generalized Subtree Data Anonymization Approach for Apache Spark

Julian Jang-Jaccard , Sibghat Ullah Bazai , Hooman Alavizadeh
Electronics 10 ( 5) 589

1
2021
Low-cost Indoor Air Quality (IAQ) Platform for Healthier Classrooms in New Zealand: Engineering Issues

Ryan Weyers , Julian Jang-Jaccard , Alfred Moses , Yu Wang
2017 4th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)

3
2017
Integrating Open-Source Technologies to Build a School Indoor Air Quality Monitoring Box (SKOMOBO)

Yu Wang , Mikael Boulic , Robyn Phipps , Chris Chitty
2017 4th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)

3
2017
Deployment issues for integrated open-source — Based indoor air quality school Monitoring Box (SKOMOBO)

Yu Wang , Julian Jang-Jaccard , Mikael Boulic , Robyn Phipps
2018 IEEE Sensors Applications Symposium (SAS) 1 -4

1
2018
Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection

Jinting Zhu , Julian Jang-Jaccard , Paul A. Watters
IEEE Access 8 171542 -171550

19
2020
Effective security analysis for combinations of MTD techniques on cloud computing (short paper)

Hooman Alavizadeh , Dong Seong Kim , Jin B. Hong , Julian Jang-Jaccard
international conference on information security 539 -548

16
2017
A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices

Hooman Alavizadeh , Hootan Alavizadeh , Kudakwashe Dube , Dong Seong Kim
international conference on information security 860 -876

2017
Comprehensive Security Assessment of Combined MTD Techniques for the Cloud

Hooman Alavizadeh , Jin B. Hong , Julian Jang-Jaccard , Dong Seong Kim
computer and communications security 11 -20

16
2018
A survey of emerging threats in cybersecurity

Julian Jang-Jaccard , Surya Nepal ,
Journal of Computer and System Sciences 80 ( 5) 973 -993

795
2014
SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform.

Sibghat Ullah Bazai , Julian Jang-Jaccard
network and system security 646 -662

2
2019
Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia.

Branko G Celler , Ross Sparks , Surya Nepal , Leila Alem
BMC Public Health 14 ( 1) 1270 -1270

20
2014
Anonymizing k-NN Classification on MapReduce

Sibghat Ullah Bazai , Julian Jang-Jaccard , Ruili Wang
international conference on mobile networks and management 364 -377

2
2017
Cybersecurity threats in cloud computing

Julian Jang-Jaccard , Surya Nepal , Y Jay Guo
Australian Journal of Telecommunications and the Digital Economy 1 ( 1) 58 -74

1
2013
A Privacy Preserving Platform for MapReduce

Sibghat Ullah Bazai , Julian Jang-Jaccard , Xuyun Zhang
Applications and Techniques in Information Security 88 -99

8
2017