default search action
Ying He 0004
Person information
- affiliation: De Montfort University, School of Computer Science and Informatics, Leicester, UK
- affiliation (former): University of Glasgow, School of Computing Science, UK
Other persons with the same name
- Ying He — disambiguation page
- Ying He 0001 — Nanyang Technological University, School of Computer Science and Engineering, Singagore
- Ying He 0002 — Beihang University (and 1 more)
- Ying He 0003 — QuantWorks, Inc. (and 1 more)
- Ying He 0005 — Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
- Ying He 0006 — Shenzhen University, College of Computer Science and Software Engineering, China (and 2 more)
- Ying He 0007 — Purdue University, Department of Mathematics, West Lafayette, IN, USA
- Ying He 0008 — Hefei University of Technology, China
- Ying He 0009 — Xiamen University, Department of Automation, School of Aeronautics and Astronautics, China
- Ying He 0010 — Soochow University, School of Computer Science and Technology, Jiangsu, China
- Ying He 0011 — University of Technology Sydney, Global Big Data Technology Centre, Ultimo, NSW, Australia
- Ying He 0012 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan National Laboratory for Optoelectronics, China (and 1 more)
- Ying He 0013 — University of Electronic Science and Technology of China, School of Information and Communication Engineering / Center of Future Media, Chengdu, China
- Ying He 0014 — University of Maryland, College Park, MD, USA
- Ying He 0015 — Harbin Institute of Technology, National Key Laboratory of Science and Technology on Tunable Laser, China
- Ying He 0016 — Jilin Agricultural Science and Technology University, College of Chinese Medicine, China
- Ying He 0017 — University of Southern Denmark, Department of Business and Economics, Odense, Denmark (and 1 more)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j20]Ying He, Ellis Inglut, Cunjin Luo:
Malware incident response (IR) informed by cyber threat intelligence (CTI). Sci. China Inf. Sci. 65(7): 1-3 (2022) - [j19]Paul Loft, Ying He, Iryna Yevseyeva, Isabel Wagner:
CAESAR8: An agile enterprise architecture approach to managing information security risks. Comput. Secur. 122: 102877 (2022) - [j18]Ying He, Efpraxia D. Zamani, Stefan Lloyd, Cunjin Luo:
Agile incident response (AIR): Improving the incident response process in healthcare. Int. J. Inf. Manag. 62: 102435 (2022) - [c30]Ying He, Cunjin Luo, Jiyuan Zheng, Kuanquan Wang, Henggui Zhang:
AI Based Directory Discovery Attack and Prevention of the Medical Systems. CinC 2022: 1-4 - [c29]Shumo Zhao, Cunjin Luo, Ying He, Linghua Li:
Simulation of Acquired LQT Syndrome Using Human Virtual Ventricular Cardiomyocyte Model. CinC 2022: 1-4 - 2021
- [j17]Richard Smith, Helge Janicke, Ying He, Fenia Ferra, Adham Albakri:
The Agile Incident Response for Industrial Control Systems (AIR4ICS) framework. Comput. Secur. 109: 102398 (2021) - [j16]Paul Loft, Ying He, Helge Janicke, Isabel Wagner:
Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis. Enterp. Inf. Syst. 15(4): 448-473 (2021) - [j15]Ying He, Ruben Suxo Camacho, Hasan Soygazi, Cunjin Luo:
Attacking and defence pathways for Intelligent Medical Diagnosis System (IMDS). Int. J. Medical Informatics 148: 104415 (2021) - [c28]Ying He, Kun Ni, Cunjin Luo:
Attacking Pathways of Health Information System (HIS). CinC 2021: 1-4 - [c27]Cunjin Luo, Ying He, Kuanquan Wang, Henggui Zhang:
Computational Analysis of the Effects of KCNJ2-linked E299V Mutation Short QT Syndrome and Its Potential Therapeutic Targets. CinC 2021: 1-4 - 2020
- [j14]Adebamigbe Fasanmade, Ying He, Ali H. Al-Bayatti, Jarrad Neil Morden, Suleiman Onimisi Aliyu, Ahmed S. Alfakeeh, Alhuseen Omar Alsayed:
A Fuzzy-Logic Approach to Dynamic Bayesian Severity Level Classification of Driver Distraction Using Image Recognition. IEEE Access 8: 95197-95207 (2020) - [j13]Efpraxia D. Zamani, Ying He, Matthew Phillips:
On the Security Risks of the Blockchain. J. Comput. Inf. Syst. 60(6): 495-506 (2020) - [j12]Giddeon Njamngang Angafor, Iryna Yevseyeva, Ying He:
Game-based learning: A review of tabletop exercises for cybersecurity incident response training. Secur. Priv. 3(6) (2020) - [c26]Ying He, Cunjin Luo, Ruben Suxo Camacho, Kuanquan Wang, Henggui Zhang:
AI-Based Security Attack Pathway for Cardiac Medical Diagnosis Systems (CMDS). CinC 2020: 1-4 - [c25]Cunjin Luo, Ying He, Kuanquan Wang, Henggui Zhang:
Computer Modelling the Effects of Chloroquine on KCNJ2 D172N and E299V Mutations-Linked Short QT Syndrome. CinC 2020: 1-4 - [c24]Cunjin Luo, Tong Liu, Ying He, Kuanquan Wang, Henggui Zhang:
Proarrhythmia in KCNJ2 E299V-linked Short QT Syndrome: A Simulation Study. CinC 2020: 1-4 - [c23]Aliyu Aliyu, Ying He, Iryna Yevseyeva, Cunjin Luo:
Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster. CNS 2020: 1-2 - [c22]Giddeon Njamngang Angafor, Iryna Yevseyeva, Ying He:
Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis. JCSG 2020: 117-131
2010 – 2019
- 2019
- [j11]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Leandros A. Maglaras:
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form. IEEE Access 7: 102087-102101 (2019) - [j10]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Efpraxia D. Zamani, Leandros A. Maglaras:
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique. IEEE Access 7: 142147-142175 (2019) - [j9]Shaimaa M. Nafea, François Siewe, Ying He:
On Recommendation of Learning Objects Using Felder-Silverman Learning Style Model. IEEE Access 7: 163034-163048 (2019) - [j8]Mark Glenn Evans, Ying He, Leandros A. Maglaras, Helge Janicke:
HEART-IS: A novel technique for evaluating human error-related information security incidents. Comput. Secur. 80: 74-89 (2019) - [j7]Morta Vitunskaite, Ying He, Thomas Brandstetter, Helge Janicke:
Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 83: 313-331 (2019) - [j6]Mark Glenn Evans, Ying He, Leandros A. Maglaras, Iryna Yevseyeva, Helge Janicke:
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. Int. J. Medical Informatics 127: 109-119 (2019) - [j5]Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Published incidents and their proportions of human error. Inf. Comput. Secur. 27(3): 343-357 (2019) - [c21]Ying He, Ruben Suxo Camacho, Cunjin Luo, Henggui Zhang:
Security Defense Strategy for Cardiac Medical Diagnosis System (CMDS). CinC 2019: 1-4 - [c20]Cunjin Luo, Dominic G. Whittaker, Ying He, Tong Liu, Yacong Li, Kuanquan Wang, Na Zhao, Henggui Zhang:
Effects of Taurine-Magnesium Coordination Compound on Type 2 Short QT Syndrome: A Simulation Study. CinC 2019: 1-4 - [c19]Cunjin Luo, Dominic G. Whittaker, Tong Liu, Kuanquan Wang, Yacong Li, Ying He, Henggui Zhang:
Pharmacotherapeutic Effects of Quinidine on Short QT Syndrome by Using Purkinje-Ventricle Model: A Simulation Study. EMBC 2019: 2856-2859 - [c18]Cunjin Luo, Hasan Soygazi, Helge Janicke, Ying He:
Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS). EMBC 2019: 3454-3457 - [c17]Shaimaa M. Nafea, François Siewe, Ying He:
A Novel Algorithm for Dynamic Student Profile Adaptation Based on Learning Styles. IntelliSys (1) 2019: 29-51 - [c16]Yuanchen Xu, Yingjie Yang, Ying He:
A Business Process Oriented Dynamic Cyber Threat Intelligence Model. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 648-653 - 2018
- [c15]Cunjin Luo, Linghua Li, Tong Liu, Kuanquan Wang, Xiangyun Bai, Ying He, Henggui Zhang:
Effects of the β-Adrenoceptor Blocker Carvedilol in Short QT Syndrome Caused by N588K Mutation in hERG: A Simulation Study. CinC 2018: 1-4 - [c14]Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error. HAISA 2018: 191-202 - [c13]Shaimaa M. Nafea, François Siewe, Ying He:
ULEARN: Personalised Learner's Profile Based on Dynamic Learning Style Questionnaire. IntelliSys (2) 2018: 1105-1124 - 2017
- [j4]Andy Wood, Ying He, Leandros A. Maglaras, Helge Janicke:
A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastructures 13(2/3): 113-132 (2017) - [c12]Suleiman Onimisi Aliyu, Feng Chen, Ying He, Hongji Yang:
A Game-Theoretic Based QoS-Aware Capacity Management for Real-Time EdgeIoT Applications. QRS 2017: 386-397 - [c11]Suleiman Onimisi Aliyu, Feng Chen, Ying He:
QoS-Aware Resource Management in SDN-Based InterClouds: A Software Cybernetics Perspective. QRS Companion 2017: 429-434 - [i2]Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin I. Jones, Helge Janicke:
Internet of Cloud: Security and Privacy issues. CoRR abs/1711.00525 (2017) - 2016
- [j3]Leandros A. Maglaras, Ali H. Al-Bayatti, Ying He, Isabel Wagner, Helge Janicke:
Social Internet of Vehicles for Smart Cities. J. Sens. Actuator Networks 5(1): 3 (2016) - [j2]Mark Glenn Evans, Leandros A. Maglaras, Ying He, Helge Janicke:
Human behaviour as an aspect of cybersecurity assurance. Secur. Commun. Networks 9(17): 4667-4679 (2016) - [c10]Isabel Wagner, Ying He, Duska Rosenberg, Helge Janicke:
User interface design for privacy awareness in eHealth technologies. CCNC 2016: 38-43 - [c9]Glen Hawthorne, Ying He, Leandros A. Maglaras, Helge Janicke:
Security Visualization: Detecting Denial of Service. INISCOM 2016: 39-49 - [c8]Neel Tailor, Ying He, Isabel Wagner:
POSTER: Design Ideas for Privacy-aware User Interfaces for Mobile Devices. WISEC 2016: 219-220 - [i1]Mark Glenn Evans, Leandros A. Maglaras, Ying He, Helge Janicke:
Human Behaviour as an aspect of Cyber Security Assurance. CoRR abs/1601.03921 (2016) - 2015
- [j1]Ying He, Chris W. Johnson:
Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template. Int. J. Medical Informatics 84(11): 941-949 (2015) - [c7]Ying He, Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
An Industrial Control Systems incident response decision framework. CNS 2015: 761-762 - [c6]Ying He, Helge Janicke:
Towards Agile Industrial Control Systems Incident Response. ICS-CSR 2015 - 2014
- [b1]Ying He:
Generic security templates for information system security arguments : mapping security arguments within healthcare systems. University of Glasgow, UK, 2014 - [c5]Ying He, Chris W. Johnson, Yu Lu, Yixia Lin:
Improving the Information Security Management: An Industrial Study in the Privacy of Electronic Patient Records. CBMS 2014: 525-526 - [c4]Ying He, Chris W. Johnson, Yu Lu, Arniyati Ahmad:
Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records. IFIPTM 2014: 109-124 - [c3]Yu Lu, Ying He:
Towards the Computation of a Nash Equilibrium. ISNN 2014: 90-99 - [c2]Ying He, Chris W. Johnson, Maria Evangelopoulou, Zheng-Shuai Lin:
Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions. TRUST 2014: 216-217 - [c1]Yu Lu, Ying He:
A Dynamic Programming Approach to the Rank Aggregation Problem. UKSim 2014: 517-524
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint