Richard Enbody
Richard Enbody
Associate Professor of Computer Science and Engineering, Michigan State University
Bestätigte E-Mail-Adresse bei cse.msu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Further Research on Feature Selection and Classification Using Genetic Algorithms.
WF Punch III, ED Goodman, M Pei, L Chia-Shun, PD Hovland, RJ Enbody
ICGA, 557-564, 1993
3831993
Dynamic hashing schemes
RJ Enbody, HC Du
ACM Computing Surveys (CSUR) 20 (2), 850-113, 1988
2191988
Targeted cyberattacks: a superset of advanced persistent threats
AK Sood, RJ Enbody
IEEE security & privacy 11 (1), 54-61, 2012
2102012
Promoting personal responsibility for internet safety
R LaRose, NJ Rifon, R Enbody
Communications of the ACM 51 (3), 71-76, 2008
2042008
Near-optimal n-layer channel routing
RJ Enbody, HC Du
23rd ACM/IEEE Design Automation Conference, 708-714, 1986
1961986
Science and application of nanotubes
MF Thorpe, D Tománek, RJ Enbody, RJ Enbody
Springer Science & Business Media, 2000
1812000
Crimeware-as-a-service—a survey of commoditized crimeware in the underground market
AK Sood, RJ Enbody
International Journal of Critical Infrastructure Protection 6 (1), 28-38, 2013
932013
Learning to program: Gender differences and interactive effects of students' motivation, goals, and self-efficacy on performance
A Lishinski, A Yadav, J Good, R Enbody
Proceedings of the 2016 ACM Conference on International Computing Education …, 2016
782016
Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing
J DeMott, R Enbody, WF Punch
BlackHat and Defcon, 2007
582007
Malvertising–exploiting web advertising
AK Sood, RJ Enbody
Computer Fraud & Security 2011 (4), 11-16, 2011
572011
Nanocapsules containing charged particles, their uses and methods of forming same
D Tomanek, R Enbody, K Young-Kyun, MW Brehob
US Patent 6,473,351, 2002
552002
An analytical model of locality and caching
M Brehob, R Enbody
Michigan State University, Department of Computer Science and Engineering …, 1999
551999
WinRDBI: a Windows-based relational database educational tool
SW Dietrich, E Eckert, K Piscator
ACM SIGCSE Bulletin 29 (1), 126-130, 1997
501997
Dissecting SpyEye–Understanding the design of third generation botnets
AK Sood, RJ Enbody, R Bansal
Computer Networks 57 (2), 436-450, 2013
492013
Performance evaluation of mesh-connected wormhole-routed networks for interprocessor communication in multicomputers
S Chittor, R Enbody
Supercomputing'90: Proceedings of the 1990 ACM/IEEE Conference on …, 1990
491990
Python CS1 as preparation for C++ CS2
RJ Enbody, WF Punch, M McCullen
Proceedings of the 40th ACM technical symposium on Computer science …, 2009
472009
Secure bit: Transparent, hardware buffer-overflow protection
K Piromsopa, RJ Enbody
IEEE Transactions on Dependable and Secure Computing 3 (4), 365-376, 2006
472006
Targeted cyber attacks: multi-staged attacks driven by exploits and malware
A Sood, R Enbody
Syngress, 2014
432014
Cybercrime: Dissecting the state of underground enterprise
AK Sood, R Bansal, RJ Enbody
IEEE internet computing 17 (1), 60-68, 2012
402012
Optimal replacement is NP-hard for nonstandard caches
M Brehob, S Wagner, E Torng, R Enbody
IEEE Transactions on computers 53 (1), 73-76, 2004
372004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20