Follow
Manghui Tu
Title
Cited by
Cited by
Year
Game based cybersecurity training for high school students
G Jin, M Tu, TH Kim, J Heffron, J White
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
1372018
Automated security test generation with formal threat models
D Xu, M Tu, M Sanford, L Thomas, D Woodraska, W Xu
IEEE transactions on dependable and secure computing 9 (4), 526-540, 2012
1372012
Evaluation of game-based learning in cybersecurity education for high school students
G Jin, M Tu, TH Kim, J Heffron, J White
Journal of Education and Learning (EduLearn) 12 (1), 150-158, 2018
1172018
Secure data objects replication in data grid
M Tu, P Li, IL Yen, BM Thuraisingham, L Khan
IEEE Transactions on dependable and secure computing 7 (1), 50-64, 2008
722008
Replica placement algorithms for mobile transaction systems
M Tu, P Li, L Xiao, IL Yen, FB Bastani
IEEE Transactions on Knowledge and Data Engineering 18 (7), 954-970, 2006
302006
Interference between two floating-leaved aquatic plants: Nymphoides peltata and Trapa bispinosa
W Zhonghua, Y Dan, T Manghui, W Qiang, X Wen
Aquatic Botany 86 (4), 316-320, 2007
282007
Data placement in P2P data grids considering the availability, security, access performance and load balancing
M Tu, H Ma, L Xiao, IL Yen, F Bastani, D Xu
Journal of grid computing 11, 103-127, 2013
252013
On the development of a digital forensics curriculum
M Tu, D Xu, S Wira, C Balan, K Cronin
Journal of Digital Forensics, Security and Law 7 (3), 2, 2012
252012
Seed germination of three species of Vallisneria (Hydrocharitaceae), and the effects of freshwater microalgae
L Zhongqiang, D Yu, T Manghui
Hydrobiologia 544, 11-18, 2005
222005
On the optimal placement of secure data objects over Internet
M Tu, P Li, Q Ma, IL Yen, FB Bastani
19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005
222005
Study on the threatened aquatic higher plant species of China
YU Dan, C Yun-Xiao, TU Mang-Hui, W Xiao-Yan, Z Xiao-Hua
Biodiversity Science 6 (1), 13, 1998
221998
Data loss prevention management and control: Inside activity incident monitoring, identification, and tracking in healthcare enterprise environments
M Tu, K Spoa-Harty, L Xiao
Journal of Digital Forensics, Security and Law 10 (1), 3, 2015
212015
Aquatic plants diversity in arid zones of Northwest China: patterns, threats and conservation
Z Li, D Yu, W Xiong, D Wang, M Tu
Biodiversity & Conservation 15, 3417-3444, 2006
202006
An optimization method for selecting parameters in support vector machines
Y Dong, Z Xia, M Tu, G Xing
Sixth International Conference on Machine Learning and Applications (ICMLA …, 2007
192007
Distributed replica placement algorithms for correlated data
M Tu, IL Yen
The Journal of Supercomputing 68, 245-273, 2014
182014
Preference update for e-commerce applications: Model, language, and processing
P Li, M Tu, IL Yen, Z Xia
Electronic Commerce Research 7, 17-44, 2007
182007
A study of the model and algorithms for handling location-dependent continuous queries
M Gupta, M Tu, L Khan, F Bastani, IL Yen
Knowledge and information systems 8, 414-437, 2005
162005
Game Based Learning for Safety and Security Education.
G Jin, S Nakayama, M Tu
Journal of Education and Learning (EduLearn) 14 (1), 114-122, 2020
132020
System resilience enhancement through modularization for large scale cyber systems
M Tu, L Xiao
2016 IEEE/CIC International Conference on Communications in China (ICCC …, 2016
132016
Automated integration testing using logical contracts
D Xu, W Xu, M Tu, N Shen, W Chu, CH Chang
IEEE Transactions on Reliability 65 (3), 1205-1222, 2015
122015
The system can't perform the operation now. Try again later.
Articles 1–20