Automated security test generation with formal threat models D Xu, M Tu, M Sanford, L Thomas, D Woodraska, W Xu IEEE transactions on dependable and secure computing 9 (4), 526-540, 2012 | 138 | 2012 |
Game based cybersecurity training for high school students G Jin, M Tu, TH Kim, J Heffron, J White Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 137 | 2018 |
Evaluation of game-based learning in cybersecurity education for high school students G Jin, M Tu, TH Kim, J Heffron, J White Journal of Education and Learning (EduLearn) 12 (1), 150-158, 2018 | 118 | 2018 |
Secure data objects replication in data grid M Tu, P Li, IL Yen, BM Thuraisingham, L Khan IEEE Transactions on dependable and secure computing 7 (1), 50-64, 2008 | 72 | 2008 |
Replica placement algorithms for mobile transaction systems M Tu, P Li, L Xiao, IL Yen, FB Bastani IEEE Transactions on Knowledge and Data Engineering 18 (7), 954-970, 2006 | 30 | 2006 |
Interference between two floating-leaved aquatic plants: Nymphoides peltata and Trapa bispinosa W Zhonghua, Y Dan, T Manghui, W Qiang, X Wen Aquatic Botany 86 (4), 316-320, 2007 | 28 | 2007 |
Data placement in P2P data grids considering the availability, security, access performance and load balancing M Tu, H Ma, L Xiao, IL Yen, F Bastani, D Xu Journal of grid computing 11, 103-127, 2013 | 25 | 2013 |
On the development of a digital forensics curriculum M Tu, D Xu, S Wira, C Balan, K Cronin Journal of Digital Forensics, Security and Law 7 (3), 2, 2012 | 25 | 2012 |
Seed germination of three species of Vallisneria (Hydrocharitaceae), and the effects of freshwater microalgae L Zhongqiang, D Yu, T Manghui Hydrobiologia 544, 11-18, 2005 | 22 | 2005 |
On the optimal placement of secure data objects over Internet M Tu, P Li, Q Ma, IL Yen, FB Bastani 19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005 | 22 | 2005 |
Study on the threatened aquatic higher plant species of China YU Dan, C Yun-Xiao, TU Mang-Hui, W Xiao-Yan, Z Xiao-Hua Biodiversity Science 6 (1), 13, 1998 | 22 | 1998 |
Data loss prevention management and control: Inside activity incident monitoring, identification, and tracking in healthcare enterprise environments M Tu, K Spoa-Harty, L Xiao Journal of Digital Forensics, Security and Law 10 (1), 3, 2015 | 21 | 2015 |
Aquatic plants diversity in arid zones of Northwest China: patterns, threats and conservation Z Li, D Yu, W Xiong, D Wang, M Tu Biodiversity & Conservation 15, 3417-3444, 2006 | 20 | 2006 |
An optimization method for selecting parameters in support vector machines Y Dong, Z Xia, M Tu, G Xing Sixth International Conference on Machine Learning and Applications (ICMLA …, 2007 | 19 | 2007 |
Distributed replica placement algorithms for correlated data M Tu, IL Yen The Journal of Supercomputing 68, 245-273, 2014 | 18 | 2014 |
Preference update for e-commerce applications: Model, language, and processing P Li, M Tu, IL Yen, Z Xia Electronic Commerce Research 7, 17-44, 2007 | 18 | 2007 |
A study of the model and algorithms for handling location-dependent continuous queries M Gupta, M Tu, L Khan, F Bastani, IL Yen Knowledge and information systems 8, 414-437, 2005 | 16 | 2005 |
Game Based Learning for Safety and Security Education. G Jin, S Nakayama, M Tu Journal of Education and Learning (EduLearn) 14 (1), 114-122, 2020 | 14 | 2020 |
System resilience enhancement through modularization for large scale cyber systems M Tu, L Xiao 2016 IEEE/CIC International Conference on Communications in China (ICCC …, 2016 | 14 | 2016 |
Automated integration testing using logical contracts D Xu, W Xu, M Tu, N Shen, W Chu, CH Chang IEEE Transactions on Reliability 65 (3), 1205-1222, 2015 | 12 | 2015 |