Richard J. Enbody

Orcid: 0000-0002-2415-5651

Affiliations:
  • Michigan State University, East Lansing, USA


According to our database1, Richard J. Enbody authored at least 63 papers between 1986 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies.
DTRAP, 2023

2020
Dissecting .NET ransomware: key generation, encryption and operation.
Netw. Secur., 2020

Attacking Key Management in Ransomware.
IT Prof., 2020

The Suitability of RSA for Bulk Data Encryption.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Preparing Smart Cities for Ransomware Attacks.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

An Empirical Study of API Calls in Ransomware.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

An Empirical Study of Key Generation in Cryptographic Ransomware.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Memory Forensics Against Ransomware.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Ransomware Targeting Automobiles.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

Towards Effective Identification and Rating of Automotive Vulnerabilities.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

2019
BATSense: Anomalous Security Event Detection using TBATS Machine Learning.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

2018
The art of mapping IoT devices in networks.
Netw. Secur., 2018

A key-management-based taxonomy for ransomware.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

2017
User authentication and identification from user interface interactions on touch-enabled devices.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Students' Emotional Reactions to Programming Projects in Introduction to Programming: Measurement Approach and Influence on Learning Outcomes.
Proceedings of the 2017 ACM Conference on International Computing Education Research, 2017

2016
An Empirical Study of HTTP-based Financial Botnets.
IEEE Trans. Dependable Secur. Comput., 2016

The Influence of Problem Solving Abilities on Students' Performance on Different Assessment Tasks in CS1.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Learning to Program: Gender Differences and Interactive Effects of Students' Motivation, Goals, and Self-Efficacy on Performance.
Proceedings of the 2016 ACM Conference on International Computing Education Research, 2016

2013
Cybercrime: Dissecting the State of Underground Enterprise.
IEEE Internet Comput., 2013

Crimeware-as-a-service - A survey of commoditized crimeware in the underground market.
Int. J. Crit. Infrastructure Prot., 2013

Targeted Cyberattacks: A Superset of Advanced Persistent Threats.
IEEE Secur. Priv., 2013

Systematic bug finding and fault localization enhanced with input data tracking.
Comput. Secur., 2013

Dissecting SpyEye - Understanding the design of third generation botnets.
Comput. Networks, 2013

2012
Abusing Glype proxies: attacks, exploits and defences.
Netw. Secur., 2012

2011
Frametrapping the framebusting defence.
Netw. Secur., 2011

Spying on the browser: dissecting the design of malicious extensions.
Netw. Secur., 2011

Towards an automatic exploit pipeline.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
The Conundrum of Declarative Security HTTP Response Headers: Lessons Learned.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

Performance of python CS1 students in mid-level non-python CS courses.
Proceedings of the 41st ACM technical symposium on Computer science education, 2010

2009
Python CS1 as preparation for C++ CS2.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

2008
Promoting personal responsibility for internet safety.
Commun. ACM, 2008

2006
Secure Bit: Transparent, Hardware Buffer-Overflow Protection.
IEEE Trans. Dependable Secur. Comput., 2006

Proactive, content-aware, sensitive data protection framework for enterprises.
Proceedings of the Third IASTED International Conference on Communication, 2006

2004
Optimal Replacement Is NP-Hard for Nonstandard Caches.
IEEE Trans. Computers, 2004

2003
On-line Restricted Caching.
J. Sched., 2003

2002
Mathematics preparation for undergraduate degrees in computer science.
Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education, 2002

2001
Using AMDAHL's Law as a Metric to Drive Code Parallelization: Two Case Studies.
Int. J. High Perform. Comput. Appl., 2001

1999
The Potential of Carbon-Based Memory Systems.
Proceedings of the 7th IEEE International Workshop on Memory Technology, 1999

1998
Performance monitoring in advanced computer architecture.
Proceedings of the 1998 workshop on Computer architecture education, 1998

The computer architecture sequence at Michigan State University.
Proceedings of the 1998 workshop on Computer architecture education, 1998

Performance Analysis and Optimization of a Parallel Carbon Molecular Dynamic Code on a Cray T3E.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Efficient Implementation of a Lanczos Eigenvalue Solver on a Cray T3E-900.
Proceedings of the High-Performance Computing and Networking, 1998

1997
Comparing Gang Scheduling with Dynamic Space Sharing on Symmetric Multiprocessors Using Automatic Self-Allocating Threads (ASAT).
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

1996
Managing the Overall Balance of Operating System Threads on a Multiprocessor Using Automatic Self-Allocating Threads (ASAT).
J. Parallel Distributed Comput., 1996

Automatic Self-Allocating Threads (ASAT) on an SGI Challenge.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

1995
Dynamic Load Balancing.
Proceedings of the Seventh SIAM Conference on Parallel Processing for Scientific Computing, 1995

A Parallel Algorithm for the Nonsymmetric Eigenvalue Problems.
Proceedings of the Seventh SIAM Conference on Parallel Processing for Scientific Computing, 1995

Automatic Self-Allocating Threads (ASAT) on the Convex Exemplar.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

1993
Real-Values Array Indices - An Initial Look.
Proceedings of the Sixth SIAM Conference on Parallel Processing for Scientific Computing, 1993

A Topology- and Problem-Independent Scalable Parallel Approach to Molecular Dynamics Simulation.
Proceedings of the Sixth SIAM Conference on Parallel Processing for Scientific Computing, 1993

Further Research on Feature Selection and Classification Using Genetic Algorithms.
Proceedings of the 5th International Conference on Genetic Algorithms, 1993

1992
A Scalable Snoopy Coherence Scheme on Distributed Shared-Memory Multiprocessors.
Proceedings of the Proceedings Supercomputing '92, 1992

3D object recognition: interpretation tree search on a MIMD machine.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992

A transparent monitoring tool for shared-memory multiprocessors.
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992

1991
Predicting the Effect of Mapping on the Communication Performance of Large Multicomputers.
Proceedings of the International Conference on Parallel Processing, 1991

Routing the 3-D Chip.
Proceedings of the 28th Design Automation Conference, 1991

1990
Performance evaluation of mesh-connected wormhole-routed networks for interprocessor communication in multicomputers.
Proceedings of the Proceedings Supercomputing '90, New York, NY, USA, November 12-16, 1990, 1990

Performance Degradation in Large Wormhole-Routed Interprocessor Communication Networks.
Proceedings of the 1990 International Conference on Parallel Processing, 1990

1989
SPYDER: a serial/parallel goal-directed router.
Integr., 1989

Hypercubes Vs. 2D Meshes.
Proceedings of the Fourth SIAM Conference on Parallel Processing for Scientific Computing, 1989

1988
Dynamic Hashing Schemes.
ACM Comput. Surv., 1988

1987
General Purpose Router.
Proceedings of the 24th ACM/IEEE Design Automation Conference. Miami Beach, FL, USA, June 28, 1987

1986
Near-optimal <i>n</i>-layer channel routing.
Proceedings of the 23rd ACM/IEEE Design Automation Conference. Las Vegas, 1986


  Loading...