Richard Enbody
Richard Enbody
Associate Professor of Computer Science and Engineering, Michigan State University
Verified email at - Homepage
Cited by
Cited by
Further Research on Feature Selection and Classification Using Genetic Algorithms.
WF Punch III, ED Goodman, M Pei, L Chia-Shun, PD Hovland, RJ Enbody
ICGA, 557-564, 1993
Targeted cyberattacks: a superset of advanced persistent threats
AK Sood, RJ Enbody
IEEE security & privacy 11 (1), 54-61, 2012
Dynamic hashing schemes
RJ Enbody, HC Du
ACM Computing Surveys (CSUR) 20 (2), 850-113, 1988
Promoting personal responsibility for internet safety
R LaRose, NJ Rifon, R Enbody
Communications of the ACM 51 (3), 71-76, 2008
Science and application of nanotubes
D Tománek, RJ Enbody
Springer Science & Business Media, 2000
Near-optimal n-layer channel routing
RJ Enbody, HC Du
23rd ACM/IEEE Design Automation Conference, 708-714, 1986
Learning to program: Gender differences and interactive effects of students' motivation, goals, and self-efficacy on performance
A Lishinski, A Yadav, J Good, R Enbody
Proceedings of the 2016 ACM conference on international computing education …, 2016
Crimeware-as-a-service—a survey of commoditized crimeware in the underground market
AK Sood, RJ Enbody
International journal of critical infrastructure protection 6 (1), 28-38, 2013
Malvertising–exploiting web advertising
AK Sood, RJ Enbody
Computer Fraud & Security 2011 (4), 11-16, 2011
Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing
J DeMott, R Enbody, WF Punch
BlackHat and Defcon, 2007
Targeted cyber attacks: multi-staged attacks driven by exploits and malware
A Sood, R Enbody
Syngress, 2014
An analytical model of locality and caching
M Brehob, R Enbody
Michigan State University, Department of Computer Science and Engineering …, 1999
An empirical study of HTTP-based financial botnets
AK Sood, S Zeadally, RJ Enbody
IEEE Transactions on Dependable and Secure Computing 13 (2), 236-251, 2014
A key-management-based taxonomy for ransomware
P Bajpai, AK Sood, R Enbody
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018
Students' emotional reactions to programming projects in introduction to programming: Measurement approach and influence on learning outcomes
A Lishinski, A Yadav, R Enbody
Proceedings of the 2017 ACM Conference on International Computing Education …, 2017
Nanocapsules containing charged particles, their uses and methods of forming same
D Tomanek, R Enbody, K Young-Kyun, MW Brehob
US Patent 6,473,351, 2002
Python CS1 as preparation for C++ CS2
RJ Enbody, WF Punch, M McCullen
Proceedings of the 40th ACM technical symposium on Computer Science …, 2009
Secure bit: Transparent, hardware buffer-overflow protection
K Piromsopa, RJ Enbody
IEEE Transactions on Dependable and Secure Computing 3 (4), 365-376, 2006
Performance evaluation of mesh-connected wormhole-routed networks for interprocessor communication in multicomputers.
S Chittor, RJ Enbody
SC, 647-657, 1990
Dissecting SpyEye–Understanding the design of third generation botnets
AK Sood, RJ Enbody, R Bansal
Computer Networks 57 (2), 436-450, 2013
The system can't perform the operation now. Try again later.
Articles 1–20