Further Research on Feature Selection and Classification Using Genetic Algorithms. WF Punch III, ED Goodman, M Pei, L Chia-Shun, PD Hovland, RJ Enbody ICGA, 557-564, 1993 | 426 | 1993 |
Targeted cyberattacks: a superset of advanced persistent threats AK Sood, RJ Enbody IEEE security & privacy 11 (1), 54-61, 2012 | 282 | 2012 |
Promoting personal responsibility for internet safety R LaRose, NJ Rifon, R Enbody Communications of the ACM 51 (3), 71-76, 2008 | 249 | 2008 |
Dynamic hashing schemes RJ Enbody, HC Du ACM Computing Surveys (CSUR) 20 (2), 850-113, 1988 | 244 | 1988 |
Science and application of nanotubes D Tománek, RJ Enbody Springer Science & Business Media, 2000 | 232 | 2000 |
Learning to program: Gender differences and interactive effects of students' motivation, goals, and self-efficacy on performance A Lishinski, A Yadav, J Good, R Enbody Proceedings of the 2016 ACM conference on international computing education …, 2016 | 228 | 2016 |
Near-optimal n-layer channel routing RJ Enbody, HC Du 23rd ACM/IEEE Design Automation Conference, 708-714, 1986 | 203 | 1986 |
Crimeware-as-a-service—a survey of commoditized crimeware in the underground market AK Sood, RJ Enbody International journal of critical infrastructure protection 6 (1), 28-38, 2013 | 153 | 2013 |
Malvertising–exploiting web advertising AK Sood, RJ Enbody Computer Fraud & Security 2011 (4), 11-16, 2011 | 95 | 2011 |
Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing J DeMott, R Enbody, WF Punch BlackHat and Defcon, 2007 | 92 | 2007 |
Targeted cyber attacks: multi-staged attacks driven by exploits and malware A Sood, R Enbody Syngress, 2014 | 77 | 2014 |
An empirical study of HTTP-based financial botnets AK Sood, S Zeadally, RJ Enbody IEEE Transactions on Dependable and Secure Computing 13 (2), 236-251, 2014 | 73 | 2014 |
An analytical model of locality and caching M Brehob, R Enbody Michigan State University, Department of Computer Science and Engineering …, 1999 | 72 | 1999 |
Students' emotional reactions to programming projects in introduction to programming: Measurement approach and influence on learning outcomes A Lishinski, A Yadav, R Enbody Proceedings of the 2017 ACM Conference on International Computing Education …, 2017 | 65 | 2017 |
The influence of problem solving abilities on students' performance on different assessment tasks in CS1 A Lishinski, A Yadav, R Enbody, J Good Proceedings of the 47th ACM technical symposium on computing science …, 2016 | 63 | 2016 |
A key-management-based taxonomy for ransomware P Bajpai, AK Sood, R Enbody 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018 | 61 | 2018 |
Secure bit: Transparent, hardware buffer-overflow protection K Piromsopa, RJ Enbody IEEE Transactions on Dependable and Secure Computing 3 (4), 365-376, 2006 | 58 | 2006 |
Dissecting SpyEye–Understanding the design of third generation botnets AK Sood, RJ Enbody, R Bansal Computer Networks 57 (2), 436-450, 2013 | 56 | 2013 |
Cybercrime: Dissecting the state of underground enterprise AK Sood, R Bansal, RJ Enbody IEEE internet computing 17 (1), 60-68, 2012 | 56 | 2012 |
Python CS1 as preparation for C++ CS2 RJ Enbody, WF Punch, M McCullen Proceedings of the 40th ACM technical symposium on Computer Science …, 2009 | 56 | 2009 |