Follow
Guenevere (Qian) Chen
Guenevere (Qian) Chen
Associate Professor, Electrical and Computer Engineering, The University of Texas at San Antonio
Verified email at utsa.edu - Homepage
Title
Cited by
Cited by
Year
Automated behavioral analysis of malware: A case study of wannacry ransomware
Q Chen, RA Bridges
2017 16th IEEE International Conference on Machine Learning and Applications …, 2017
2552017
A survey of intrusion detection systems leveraging host data
RA Bridges, TR Glass-Vanderlan, MD Iannacone, MS Vincent, Q Chen
ACM Computing Surveys (CSUR) 52 (6), 1-35, 2019
1232019
A Model-based Approach to Self-Protection in Computing System
Q Chen, S Abdelwahed, A Erradi
2013 ACM Cloud and Autonomic Computing Conference (CAC '13), 2013
572013
A Model-based Validated Autonomic Approach to Self-Protect Computing Systems
C Qian, A Sherif, E Abdelkarim
Internet of Things Journal, IEEE 1 (5), 446-460, 2014
53*2014
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification
KC Roy, Q Chen
Information Systems Frontiers, https://doi.org/10.1007/s10796-020-10017, 2020
472020
Automated ransomware behavior analysis: Pattern extraction and early detection
Q Chen, SR Islam, H Haswell, RA Bridges
Science of Cyber Security: Second International Conference, SciSec 2019 …, 2019
422019
Developing Hands-on Labware for Emerging Database Security
L Li, K Qian, Q Chen, R Hasan, G Shao
ACM SOGOTE/RIIT 2016. Sept. 28-Oct. 1, 2016, Boston, MA, USA, 2016
392016
A Data Integrity Verification Scheme in Mobile Cloud Computing
C Lin, Z Shen, Q Chen, FT Sheldon
Journal of Network and Computer Applications, 2016
382016
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5 (3 (2015 …, 2015
362015
Towards realizing a distributed event and intrusion detection system
Q Chen, HA Kholidy, S Abdelwahed, J Hamilton
Future Network Systems and Security: Third International Conference, FNSS …, 2017
342017
Iotcop: A blockchain-based monitoring framework for detection and isolation of malicious devices in internet-of-things systems
SS Seshadri, D Rodriguez, M Subedi, KKR Choo, S Ahmed, Q Chen, ...
IEEE Internet of Things Journal 8 (5), 3346-3359, 2020
292020
A Model-based Approach to Self-Protection in SCADA Systems
Q Chen, S Abdelwahed
9th International Workshop on Feedback Computing (Feedback Computing 14), 2014
292014
Ropgen: Towards robust code authorship attribution via automatic coding style transformation
Z Li, G Chen, C Chen, Y Zou, S Xu
Proceedings of the 44th International Conference on Software Engineering …, 2022
222022
Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design
M Banerjee, J Lee, Q Chen, KKR Choo
2018 27th International Conference on Computer Communication and Networks …, 2018
212018
High-Performance Intrusion Response Planning on Many-Core Architectures
S Iannucci, Q Chen, S Abdelwahed
Workshop on Network Security Analytics and Automation, colocated with the …, 2016
212016
Towards Autonomic Security Management of Healthcare Information Systems
Q Chen, J Lambright, S Abdelwahed
2016 IEEE First International Conference on Connected Health: Applications …, 2016
202016
Towards realizing self-protecting SCADA systems
Q Chen, S Abdelwahed
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
202014
Blockchain-based automated and robust cyber security management
S He, E Ficke, MMA Pritom, H Chen, Q Tang, Q Chen, M Pendleton, ...
Journal of Parallel and Distributed Computing 163, 62-82, 2022
192022
Toward realizing self-protecting healthcare information systems: Design and security challenges
Q Chen
Advances in Computers 114, 113, 2019
162019
A safety and security architecture for reducing accidents in intelligent transportation systems
Q Chen, AK Sowan, S Xu
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2018
162018
The system can't perform the operation now. Try again later.
Articles 1–20