Jassim Happa
Jassim Happa
Lecturer in Information Security, Royal Holloway
Verified email at rhul.ac.uk
Cited by
Cited by
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
Illuminating the past: state of the art
J Happa, M Mudge, K Debattista, A Artusi, A Gonçalves, A Chalmers
Virtual reality 14 (3), 155-182, 2010
Virtual relighting of a roman statue head from herculaneum: a case study
J Happa, M Williams, G Turley, G Earl, P Dubla, G Beale, G Gibbons, ...
Proceedings of the 6th International Conference on Computer Graphics …, 2009
The SOM family: virtual machines for teaching and research
M Haupt, R Hirschfeld, T Pape, G Gabrysiak, S Marr, A Bergmann, ...
Proceedings of the fifteenth annual conference on Innovation and technology …, 2010
The Virtual Reconstruction and Daylight Illumination of the Panagia Angeloktisti.
J Happa, A Artusi, P Dubla, T Bashford-Rogers, K Debattista, V Hulusic, ...
International Symposium on Virtual Reality, Archaeology, and Cultural …, 2009
A re-painted AMAZON
G Earl, G Beale, J Happa, M Williams, G Turley, K Martinez, A Chalmers
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
IEEE Security and Privacy Workshops (SPW), 286-295, 2016
CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
S Creese, M Goldsmith, N Moffat, J Happa, I Agrafiotis
IEEE Conference on Technologies for Homeland Security, 7, 2013
Detecting disguised processes using Application-Behavior Profiling
C Vaas, J Happa
IEEE International Symposium on Technologies for Homeland Security, 2017
Cultural Heritage Predictive Rendering
J Happa, T Bashford‐Rogers, A Wilkie, A Artusi, K Debattista, A Chalmers
Computer Graphics Forum 31 (6), 1823-1836, 2012
A Model to Facilitate Discussions about Cyber Attacks
J Happa, G Fairclough
Springer Ethics and Policies for Cyber Operation: A NATO Cooperative Cyber …, 2017
Insider-threat detection using gaussian mixture models and sensitivity profiles
K Al Tabash, J Happa
Computers & Security 77, 838-859, 2018
NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data.
J Nicholls, D Peters, A Slawinski, T Spoor, S Vicol, J Happa, M Goldsmith, ...
TPCG, 9-16, 2013
High dynamic range video for cultural heritage documentation and experimental archaeology
J Happa, A Artusi, S Czanner, A Chalmers
Proceedings of the 11th International conference on Virtual Reality …, 2010
Assessing a virtual baby feeding training system
A Petrasova, G Czanner, J Happa, S Czanner, D Wolke, A Chalmers
Proceedings of the 7th international conference on computer graphics …, 2010
Polychromy, Digital Simulation and an Amazon from Herculaneum
G Beale, GP Earl, A Chalmers, J Happa, M Williams
Proceedings of TRAC, 2009
Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation
A Rodríguez-Mota, PJ Escamilla-Ambrosio, J Happa, JRC Nurse
IEEE Latin-American Conference on Communications (LATINCOM), 1-6, 2017
Classification of Malware Families Based on Runtime Behaviour
M Geden, J Happa
CSS International Symposium on Cyberspace Safety and Security, 2018
GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements
A Rodriguez-Mota, PJ Escamilla-Ambrosio, J Happa, E Aguirre-Anaya
AFI 360 Conference Track on Future Internet and Internet of Things Applications, 2016
Rendering Interior Cultural Heritage Scenes Using Image-based Shooting.
J Happa, T Bashford-Rogers, K Debattista, A Chalmers
Eurographics (Areas Papers), 49-56, 2011
The system can't perform the operation now. Try again later.
Articles 1–20