Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Happa, Jassim
add a person with the name Happa, Jassim
 

Other publications of authors with the same name

Virtual relighting of a Roman statue head from Herculaneum: a case study., , , , , , , , and . Afrigraph, page 5-12. ACM, (2009)A Re-Painted Amazon., , , , , , and . EVA, BCS, (2009)High Dynamic Range Video for Cultural Heritage Documentation and Experimental Archaeology., , , and . VAST, page 17-24. Eurographics Association, (2010)Validating an Insider Threat Detection System: A Real Scenario Perspective., , , , and . IEEE Symposium on Security and Privacy Workshops, page 286-295. IEEE Computer Society, (2016)Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation., , , and . LATINCOM, page 1-6. IEEE, (2016)Cyber Security Threats and Challenges in Collaborative Mixed-Reality., , and . Front. ICT, (2019)Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection., , , , , , and . JoWUA, 4 (4): 20-37 (2013)Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices., , and . JoWUA, 7 (1): 39-57 (2016)A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them., , , and . CSS, volume 11161 of Lecture Notes in Computer Science, page 18-32. Springer, (2018)Assessing a virtual baby feeding training system., , , , , and . Afrigraph, page 37-44. ACM, (2010)