92 Publications (Page 1 of 4)
2024
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead. Information
. | Journal Article
Article has an altmetric score of 16
2023
Detection of Ethereum Eclipse Attack based on Hybrid Method and Dynamic Weighted Entropy
Bhumichai, D. and Benton, R.
(pp. 779-786)
 
Feature Extraction of Network Traffic in Ethereum Blockchain Network Layer for Eclipse Attack Detection
Bhumichai, D. and Benton, R.
(pp. 869-876)
2022
Computational framework for generating synthetic signal peptides
Johnsten, T.Prakash, A.Daly, G.T.Benton, R.G. and Clark, T.
 
Profiling CPU Behavior for Detection of Android Ransomware
Cabral, R.McDonald, J.T.Hively, L.M. and Benton, R.G.
Conference Proceedings - IEEE SOUTHEASTCON, vol. 2022-March, pp. 690-697. | Conference Proceeding
 
The Intersection of Persuasive System Design and Personalization in Mobile Health: Statistical Evaluation. JMIR mHealth and uHealth
Article has an altmetric score of 3
2021
A metabolomic endotype of bioenergetic dysfunction predicts mortality in critically ill patients with acute respiratory failure
Langley, Raymond JLangley, Raymond JLangley, Raymond J.Migaud, Marie EMigaud, Marie E.Migaud, Marie EFlores, LoriFlores, LoriFlores, LoriThompson, J WillThompson, J. Will ...more »
. | Journal Article
Article has an altmetric score of 2
 
A method for computationally constructing eukaryotic synthetic signal peptide sequences
Daly, G.T.Prakash, A.Benton, R.G. and Johnsten, T.
Article has an altmetric score of 2
 
Classifying Android Applications Via System Stats
Hightower, J.Glisson, W.B.Benton, R. and McDonald, J.T.
(pp. 5388-5394)
 
Detecting deception using machine learning
Delgado, A.A.C.Glisson, W.B.Shashidhar, N.McDonald, J.T.Grispos, G. and Benton, R.
Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2020-January, pp. 7122-7131. | Conference Proceeding
 
Detecting deception using machine learning
Delgado, A.A.C.Glisson, W.B.Shashidhar, N.McDonald, J.T.Grispos, G. and Benton, R.
(pp. 7122-7131)
 
Insight from a containerized Kubernetes workload introspection
Watts, T.Benton, R.Bourrie, D. and Shropshire, J.
(pp. 6955-6964)
 
Insight from a Containerized Kubernetes Workload Introspection
Watts, ThomasBenton, RyanShropshire, Jordan and Bourrie, David
Hawaii International Conference on System Sciences. | Conference Proceeding
 
Machine learning-based android malware detection using manifest permissions
McDonald, J.T.Herron, N.Glisson, W.B. and Benton, R.K.
(pp. 6976-6985)
 
Machine Learning-Based Android Malware Detection Using Manifest Permissions
Mcdonald, JeffreyHerron, NathanGlisson, William and Benton, Ryan
Hawaii International Conference on System Sciences. | Conference Proceeding
 
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Mink, Dustin M.McDonald, JeffreyBagui, SikhaGlisson, William B.Shropshire, JordanBenton, Ryan and Russ, Samuel
Big Data and Cognitive Computing, vol. 5, pp. 27. | Journal Article
Article has an altmetric score of 1
 
RARE: Rare Action Rule Exploration
Johns, B.A.Benton, R.G.Johnsten, T. and Bourrie, D.M.
(pp. 2603-2610)
 
Utilizing Machine Learning Techniques to Predict the Efficacy of Aerobic Exercise Intervention on Young Hypertensive Patients Based on Cardiopulmonary Exercise Testing
Huang, F.Huang, FangwanLeng, XiuyuLeng, X.Kasukurthi, Mohan VamsiKasukurthi, M.V.Huang, Y.Huang, YulongLi, D.Li, DongqiTan, S. ...more »
Journal of Healthcare Engineering, vol. 2021. | Journal Article
2020
A deep learning approach to phase-space analysis for seizure detection
Shropshire, H. and Benton, R.
(pp. 501-511)
 
A deep learning approach to phase-space analysis for seizure detection
Shropshire, H. and Benton, R.
Southeast Decision Sciences Institute Annual Meeting, pp. 501-511. | Conference Proceeding
 
A Holistic End-to-End Prescriptive Maintenance Framework
Choubey, SureshBenton, Ryan G. and Johnsten, Tom
Data-Enabled Discovery and Applications, vol. 4. | Journal Article
 
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology.
Li, JianLi, JianLi, JianLi, JianZhang, ZelinZhang, ZelinZhang, ZelinZhang, ZelinLi, ShengyuLi, ShengyuLi, Shengyu ...more »
BMC medical informatics and decision making, vol. 20, pp. 297, December 15, 2020. | Journal Article
 
Container and VM visualization for rapid incident response
Shropshire, J. and Benton, R.
(pp. 6397-6406)
 
Container and VM visualization for rapid incident response
Shropshire, J. and Benton, R.
Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2020-January, pp. 6397-6406. | Conference Proceeding
 
Decision Surfaces of Localized Classifiers
Brown, C. and Benton, R.G.