Deepran: Attention-based bilstm and crf for ransomware early detection and classification KC Roy, Q Chen Information Systems Frontiers 23, 299-315, 2021 | 52 | 2021 |
Single-mode porous fiber for low-loss polarization maintaining terahertz transmission S Rana, M Saiful Islam, M Faisal, KC Roy, R Islam, SF Kaijage Optical Engineering 55 (7), 076114-076114, 2016 | 41 | 2016 |
Exhpd: Exploiting human, physical, and driving behaviors to detect vehicle cyber attacks Q Chen, P Romanowich, J Castillo, KC Roy, G Chavez, S Xu IEEE Internet of Things Journal 8 (18), 14355-14371, 2021 | 7 | 2021 |
Ultrasound strain imaging based on information theoretic delay estimation MMH Shuvo, ABMA Hossain, KC Roy 2014 17th International Conference on Computer and Information Technology …, 2014 | 3 | 2014 |
Towards modeling host-based data for cyber-psychological assessment in cyber threat detection KC Roy The University of Texas at San Antonio, 2022 | 2 | 2022 |
Detailed Statistical Models of Host-Based Data for Detection of Malicious Activity. E Acquesta, G Chen, SS Adams, RD Bryant, JJ Haas, NT Johnson, ... Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2019 | 2 | 2019 |
Development of a Portable GSM SMS-Based Patient Monitoring System for Healthcare Applications MMH Shuvo Global Journal of Computer Science and Technology 14 (G2), 21-26, 2014 | 2 | 2014 |
GraphCH: A Deep Framework for Assessing Cyber-Human Aspects in Insider Threat Detection KC Roy, G Chen IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification RK Chandra, Q Chen Information Systems Frontiers 23 (2), 299-315, 2021 | | 2021 |
Simulation study of strain imaging using nonlinear ultrasound radio frequency signals MMH Shuvo, ABMA Hossain, KC Roy 2014 9th International Forum on Strategic Technology (IFOST), 132-135, 2014 | | 2014 |
SANDIA REPORT ECS Acquesta, GQ Chen, SS Adams, R Bryant, JJ Haas, NT Johnson, ... | | |