Follow
Jinsheng Xu
Jinsheng Xu
Associate Professor of Computer Science, North Carolina A&T State University
Verified email at ncat.edu
Title
Cited by
Cited by
Year
Visualization tools for teaching computer security
X Yuan, P Vega, Y Qadah, R Archer, H Yu, J Xu
ACM Transactions on Computing Education (TOCE) 9 (4), 1-28, 2010
522010
A survey of asynchronous collaboration tools
J Xu, J Zhang, T Harvey, J Young
2008 International Conference on Enterprise Information Systems and Web …, 2008
442008
LAN attacker: A visual education tool
T Baxley, J Xu, H Yu, J Zhang, X Yuan, J Brickhouse
Proceedings of the 3rd annual conference on Information security curriculum …, 2006
182006
Performance evaluation of machine learning algorithms in Apache spark for intrusion detection
A Dobson, K Roy, X Yuan, J Xu
2018 28th International Telecommunication Networks and Applications …, 2018
172018
An interactive visualization tool for teaching ARP spoofing attack
B Scott, J Xu, J Zhang, A Brown, E Clark, X Yuan, A Yu, K Williams
2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017
172017
Agent simulation of collaborative knowledge processing in wikipedia
J Xu, L Yilmaz, J Zhang
Proceedings of the 2008 Spring simulation multiconference, 19-25, 2008
172008
An animated learning tool for Kerberos authentication architecture
X Yuan, Y Qadah, J Xu, H Yu, R Archer, B Chu
Journal of Computing Sciences in Colleges 22 (6), 147-155, 2007
152007
Teaching mobile computing and mobile security
X Yuan, K Williams, S McCrickard, C Hardnett, LH Lineberry, K Bryant, ...
2016 IEEE Frontiers in Education Conference (FIE), 1-6, 2016
142016
A study on community formation in collaborative tagging systems
C Dichev, J Xu, D Dicheva, J Zhang
2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008
142008
Developing and assessing a web-based interactive visualization tool to teach buffer overflow concepts
J Zhang, X Yuan, J Johnson, J Xu, M Vanamala
2020 IEEE Frontiers in Education Conference (FIE), 1-7, 2020
132020
Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III
C Faust, G Dozier, J Xu, MC King
2017 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2017
132017
A survey of security standards applicable to health information systems
F Akowuah, X Yuan, J Xu, H Wang
International Journal of Information Security and Privacy (IJISP) 7 (4), 22-36, 2013
132013
Teaching cybersecurity using guided inquiry collaborative learning
X Yuan, T Zhang, AA Shama, J Xu, L Yang, J Ellis, W He, C Waters
2019 IEEE Frontiers in Education Conference (FIE), 1-6, 2019
122019
Using packet sniffer simulator in the class: Experience and evaluation
X Yuan, P Vega, J Xu, H Yu, Y Li
Proceedings of the 45th annual southeast regional conference, 116-121, 2007
122007
Teaching a web security course to practice information assurance
H Yu, W Liao, X Yuan, J Xu
Proceedings of the 37th SIGCSE technical symposium on Computer science …, 2006
122006
Authorship attribution vs. adversarial authorship from a liwc and sentiment analysis perspective
J Gaston, M Narayanan, G Dozier, DL Cothran, C Arms-Chavez, M Rossi, ...
2018 IEEE Symposium Series on Computational Intelligence (SSCI), 920-927, 2018
112018
Enhancing cybersecurity education using POGIL
X Yuan, L Yang, W He, JT Ellis, J Xu, CK Waters
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
102017
Authorship attribution via evolutionary hybridization of sentiment analysis, liwc, and topic modeling features
J Gaston, M Narayanan, G Dozier, DL Cothran, C Arms-Chavez, M Rossi, ...
2018 IEEE Symposium Series on Computational Intelligence (SSCI), 933-940, 2018
92018
Learning Snort rules by capturing intrusions in live network traffic replay
J Xu, J Zhang, T Gadipalli, X Yaun, H Yu
Proceedings of the 15th Colloquium for Information Systems Security …, 2011
92011
A visualization tool for wireless network attacks
X Yuan, R Archer, J Xu, H Yu
Journal of Education, Informatics and Cybernetics 1 (3), 2008
92008
The system can't perform the operation now. Try again later.
Articles 1–20