Jassim Happa
Jassim Happa
Lecturer in Information Security, Royal Holloway
Email confirmado em rhul.ac.uk
Citado por
Citado por
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
Illuminating the past: state of the art
J Happa, M Mudge, K Debattista, A Artusi, A Gonçalves, A Chalmers
Virtual reality 14 (3), 155-182, 2010
Virtual relighting of a roman statue head from herculaneum: a case study
J Happa, M Williams, G Turley, G Earl, P Dubla, G Beale, G Gibbons, ...
Proceedings of the 6th International Conference on Computer Graphics …, 2009
Detecting disguised processes using Application-Behavior Profiling
C Vaas, J Happa
IEEE International Symposium on Technologies for Homeland Security, 2017
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
IEEE Security and Privacy Workshops (SPW), 286-295, 2016
The Virtual Reconstruction and Daylight Illumination of the Panagia Angeloktisti.
J Happa, A Artusi, P Dubla, T Bashford-Rogers, K Debattista, V Hulusic, ...
International Symposium on Virtual Reality, Archaeology, and Cultural …, 2009
CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
S Creese, M Goldsmith, N Moffat, J Happa, I Agrafiotis
IEEE Conference on Technologies for Homeland Security, 7, 2013
A re-painted amazon
G Earl, G Beale, J Happa, M Williams, G Turley, K Martinez, A Chalmers
Cyber Security Threats and Challenges in Collaborative Mixed-Reality
J Happa, M Glencross, A Steed
Frontiers in ICT-Virtual Environments, 2019
A Model to Facilitate Discussions about Cyber Attacks
J Happa, G Fairclough
Springer Ethics and Policies for Cyber Operation: A NATO Cooperative Cyber …, 2017
Insider-threat detection using gaussian mixture models and sensitivity profiles
K Al Tabash, J Happa
Computers & Security 77, 838-859, 2018
Cultural Heritage Predictive Rendering
J Happa, T Bashford‐Rogers, A Wilkie, A Artusi, K Debattista, A Chalmers
Computer Graphics Forum 31 (6), 1823-1836, 2012
GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements
A Rodriguez-Mota, PJ Escamilla-Ambrosio, J Happa, E Aguirre-Anaya
AFI 360 Conference Track on Future Internet and Internet of Things Applications, 2016
High dynamic range video for cultural heritage documentation and experimental archaeology
J Happa, A Artusi, S Czanner, A Chalmers
Proceedings of the 11th International conference on Virtual Reality …, 2010
Assessing a virtual baby feeding training system
A Petrasova, G Czanner, J Happa, S Czanner, D Wolke, A Chalmers
Proceedings of the 7th international conference on computer graphics …, 2010
RicherPicture: Semi-automated cyber defence using context-aware data analytics
A Erola, I Agrafiotis, J Happa, M Goldsmith, S Creese, P Legg
IEEE International Conference On Cyber Situational Awareness, Data Analytics …, 2017
NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data.
J Nicholls, D Peters, A Slawinski, T Spoor, S Vicol, J Happa, M Goldsmith, ...
TPCG, 9-16, 2013
Sonification to Support the Monitoring Tasks of Security Operations Centres
L Axon, J Happa, A Janse van Rensburg, M Goldsmith, S Creese
IEEE Transactions on Dependable and Secure Computing, 1-18, 2019
Hearing Attacks in Network Data: an Effectiveness Study
L Axon, J Happa, M Goldsmith, S Creese
Computers & Security 83, 367-388, 2019
A survey of keylogger and screenlogger attacks in the banking sector and countermeasures to them
H Sbai, M Goldsmith, S Meftali, J Happa
CSS International Symposium on Cyberspace Safety and Security, 2018
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20