Jassim Happa

Orcid: 0000-0002-0860-5130

According to our database1, Jassim Happa authored at least 34 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ViLanIoT: A visual language for improving Internet of Things systems representation.
J. Ind. Inf. Integr., March, 2024

2023
Detecting CAN Attacks on J1939 and NMEA 2000 Networks.
IEEE Trans. Dependable Secur. Comput., 2023

2021
Sonification to Support the Monitoring Tasks of Security Operations Centres.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-certification standards for extended-reality devices and services.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2021

Bridging the Discipline Gap: Towards Improving Heritage and Computer Graphics Research Collaboration.
Proceedings of the GCH 2021, 2021

A Novel Behavioural Screenlogger Detection System.
Proceedings of the Information Security - 24th International Conference, 2021

2020
A survey on screenlogger attacks as well as countermeasures.
Int. J. Embed. Syst., 2020

Capturing Tacit Knowledge in Security Operation Centers.
IEEE Access, 2020

Dataset Construction and Analysis of Screenshot Malware.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Studying Illumination and Cultural Heritage.
Proceedings of the Visual Computing for Cultural Heritage, 2020

2019
Cyber Security Threats and Challenges in Collaborative Mixed-Reality.
Frontiers ICT, 2019

Hearing attacks in network data: An effectiveness study.
Comput. Secur., 2019

Anomaly Detection Using Pattern-of-Life Visual Metaphors.
IEEE Access, 2019

2018
Reassessing Android Malware Analysis: From Apps to IoT System Modelling.
EAI Endorsed Trans. Ubiquitous Environ., 2018

Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles.
Comput. Secur., 2018

Run-Time Monitoring of Data-Handling Violations.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Classification of Malware Families Based on Runtime Behaviour.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
RicherPicture: Semi-automated cyber defence using context-aware data analytics.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Validating an Insider Threat Detection System: A Real Scenario Perspective.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation.
Proceedings of the 8th IEEE Latin-American Conference on Communications, 2016

A Pragmatic System-failure Assessment and Response Model.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2013
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data.
Proceedings of the Theory and Practice of Computer Graphics, 2013

2012
Cultural Heritage Predictive Rendering.
Comput. Graph. Forum, 2012

2011
High-fidelity rendering and display of cultural heritage.
PhD thesis, 2011

Rendering Interior Cultural Heritage Scenes Using Image-based Shooting.
Proceedings of the 32nd Annual Conference of the European Association for Computer Graphics, 2011

2010
Illuminating the past: state of the art.
Virtual Real., 2010

High Dynamic Range Video for Cultural Heritage Documentation and Experimental Archaeology.
Proceedings of the 11th International Symposium on Virtual Reality, 2010

Assessing a virtual baby feeding training system.
Proceedings of the 7th International Conference on Computer Graphics, 2010

2009
The Virtual Reconstruction and Daylight Illumination of the Panagia Angeloktisti.
Proceedings of the 10th International Symposium on Virtual Reality, 2009

A Re-Painted Amazon.
Proceedings of the Electronic Visualisation and the Arts, 2009

Virtual relighting of a Roman statue head from Herculaneum: a case study.
Proceedings of the 6th International Conference on Computer Graphics, 2009


  Loading...