Further Research on Feature Selection and Classification Using Genetic Algorithms. WF Punch III, ED Goodman, M Pei, L Chia-Shun, PD Hovland, RJ Enbody ICGA, 557-564, 1993 | 418 | 1993 |
Targeted cyberattacks: a superset of advanced persistent threats AK Sood, RJ Enbody IEEE security & privacy 11 (1), 54-61, 2012 | 265 | 2012 |
Dynamic hashing schemes RJ Enbody, HC Du ACM Computing Surveys (CSUR) 20 (2), 850-113, 1988 | 244 | 1988 |
Promoting personal responsibility for internet safety R LaRose, NJ Rifon, R Enbody Communications of the ACM 51 (3), 71-76, 2008 | 243 | 2008 |
Science and application of nanotubes D Tománek, RJ Enbody Springer Science & Business Media, 2000 | 219 | 2000 |
Near-optimal n-layer channel routing RJ Enbody, HC Du 23rd ACM/IEEE Design Automation Conference, 708-714, 1986 | 204 | 1986 |
Learning to program: Gender differences and interactive effects of students' motivation, goals, and self-efficacy on performance A Lishinski, A Yadav, J Good, R Enbody Proceedings of the 2016 ACM conference on international computing education …, 2016 | 184 | 2016 |
Crimeware-as-a-service—a survey of commoditized crimeware in the underground market AK Sood, RJ Enbody International journal of critical infrastructure protection 6 (1), 28-38, 2013 | 140 | 2013 |
Malvertising–exploiting web advertising AK Sood, RJ Enbody Computer Fraud & Security 2011 (4), 11-16, 2011 | 86 | 2011 |
Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing J DeMott, R Enbody, WF Punch BlackHat and Defcon, 2007 | 86 | 2007 |
Targeted cyber attacks: multi-staged attacks driven by exploits and malware A Sood, R Enbody Syngress, 2014 | 73 | 2014 |
An analytical model of locality and caching M Brehob, R Enbody Michigan State University, Department of Computer Science and Engineering …, 1999 | 69 | 1999 |
An empirical study of HTTP-based financial botnets AK Sood, S Zeadally, RJ Enbody IEEE Transactions on Dependable and Secure Computing 13 (2), 236-251, 2014 | 67 | 2014 |
A key-management-based taxonomy for ransomware P Bajpai, AK Sood, R Enbody 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018 | 58 | 2018 |
Students' emotional reactions to programming projects in introduction to programming: Measurement approach and influence on learning outcomes A Lishinski, A Yadav, R Enbody Proceedings of the 2017 ACM Conference on International Computing Education …, 2017 | 57 | 2017 |
Nanocapsules containing charged particles, their uses and methods of forming same D Tomanek, R Enbody, K Young-Kyun, MW Brehob US Patent 6,473,351, 2002 | 57 | 2002 |
Python CS1 as preparation for C++ CS2 RJ Enbody, WF Punch, M McCullen Proceedings of the 40th ACM technical symposium on Computer Science …, 2009 | 56 | 2009 |
Secure bit: Transparent, hardware buffer-overflow protection K Piromsopa, RJ Enbody IEEE Transactions on Dependable and Secure Computing 3 (4), 365-376, 2006 | 56 | 2006 |
Performance evaluation of mesh-connected wormhole-routed networks for interprocessor communication in multicomputers. S Chittor, RJ Enbody SC, 647-657, 1990 | 56 | 1990 |
Dissecting SpyEye–Understanding the design of third generation botnets AK Sood, RJ Enbody, R Bansal Computer Networks 57 (2), 436-450, 2013 | 55 | 2013 |