92 Publications (Page 1 of 4)
2024
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead. Information
. | Journal Article
2023
Detection of Ethereum Eclipse Attack based on Hybrid Method and Dynamic Weighted EntropyBhumichai, D. and Benton, R.(pp. 779-786)
Feature Extraction of Network Traffic in Ethereum Blockchain Network Layer for Eclipse Attack DetectionBhumichai, D. and Benton, R.(pp. 869-876)
2022
Computational framework for generating synthetic signal peptidesJohnsten, T.⋅Prakash, A.⋅Daly, G.T.⋅Benton, R.G. and Clark, T.
Profiling CPU Behavior for Detection of Android RansomwareCabral, R.⋅McDonald, J.T.⋅Hively, L.M. and Benton, R.G.Conference Proceedings - IEEE SOUTHEASTCON, vol. 2022-March, pp. 690-697. | Conference Proceeding
The Intersection of Persuasive System Design and Personalization in Mobile Health: Statistical Evaluation. JMIR mHealth and uHealth
2021
A metabolomic endotype of bioenergetic dysfunction predicts mortality in critically ill patients with acute respiratory failureLangley, Raymond J⋅Langley, Raymond J⋅Langley, Raymond J.⋅Migaud, Marie E⋅Migaud, Marie E.⋅Migaud, Marie E⋅Flores, Lori⋅Flores, Lori⋅Flores, Lori⋅Thompson, J Will⋅Thompson, J. Will⋅Will, Thompson J⋅Kean, Elizabeth A.⋅Kean, Elizabeth A⋅Kean, Elizabeth A⋅Mostellar, Murphy M.⋅Mostellar, Murphy M⋅Mostellar, Murphy M⋅Mowry, Matthew⋅Mowry, Matthew⋅Mowry, Matthew⋅Luckett, Patrick⋅Luckett, Patrick⋅Luckett, Patrick⋅Purcell, Lina D⋅Purcell, Lina D.⋅Purcell, Lina D⋅Lovato, James⋅Lovato, James⋅Lovato, James⋅Gandotra, Sheetal⋅Gandotra, Sheetal⋅Benton, Ryan⋅Benton, Ryan⋅Benton, Ryan⋅Files, D Clark⋅Files, D. Clark⋅Clark, Files D⋅Harrod, Kevin S⋅Harrod, Kevin S⋅Harrod, Kevin S.⋅Gillespie, Mark N⋅Gillespie, Mark N⋅Gillespie, Mark N.⋅Morris, Peter E⋅Morris, Peter E and Morris, Peter E..
| Journal Article
A method for computationally constructing eukaryotic synthetic signal peptide sequencesDaly, G.T.⋅Prakash, A.⋅Benton, R.G. and Johnsten, T.
Classifying Android Applications Via System StatsHightower, J.⋅Glisson, W.B.⋅Benton, R. and McDonald, J.T.(pp. 5388-5394)
Detecting deception using machine learningDelgado, A.A.C.⋅Glisson, W.B.⋅Shashidhar, N.⋅McDonald, J.T.⋅Grispos, G. and Benton, R.Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2020-January, pp. 7122-7131. | Conference Proceeding
Detecting deception using machine learningDelgado, A.A.C.⋅Glisson, W.B.⋅Shashidhar, N.⋅McDonald, J.T.⋅Grispos, G. and Benton, R.(pp. 7122-7131)
Insight from a containerized Kubernetes workload introspectionWatts, T.⋅Benton, R.⋅Bourrie, D. and Shropshire, J.(pp. 6955-6964)
Insight from a Containerized Kubernetes Workload IntrospectionWatts, Thomas⋅Benton, Ryan⋅Shropshire, Jordan and Bourrie, DavidHawaii International Conference on System Sciences. | Conference Proceeding
Machine learning-based android malware detection using manifest permissionsMcDonald, J.T.⋅Herron, N.⋅Glisson, W.B. and Benton, R.K.(pp. 6976-6985)
Machine Learning-Based Android Malware Detection Using Manifest PermissionsMcdonald, Jeffrey⋅Herron, Nathan⋅Glisson, William and Benton, RyanHawaii International Conference on System Sciences. | Conference Proceeding
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-BMink, Dustin M.⋅McDonald, Jeffrey⋅Bagui, Sikha⋅Glisson, William B.⋅Shropshire, Jordan⋅Benton, Ryan and Russ, SamuelBig Data and Cognitive Computing, vol. 5, pp. 27.
| Journal Article
RARE: Rare Action Rule ExplorationJohns, B.A.⋅Benton, R.G.⋅Johnsten, T. and Bourrie, D.M.(pp. 2603-2610)
Utilizing Machine Learning Techniques to Predict the Efficacy of Aerobic Exercise Intervention on Young Hypertensive Patients Based on Cardiopulmonary Exercise TestingHuang, F.⋅Huang, Fangwan⋅Leng, Xiuyu⋅Leng, X.⋅Kasukurthi, Mohan Vamsi⋅Kasukurthi, M.V.⋅Huang, Y.⋅Huang, Yulong⋅Li, D.⋅Li, Dongqi⋅Tan, S.⋅Tan, Shaobo⋅Lu, Guiying⋅Lu, G.⋅Lu, Juhong⋅Lu, J.⋅Benton, R.G.⋅Benton, Ryan G⋅Borchert, G.M.⋅Borchert, Glen M⋅Huang, Jingshan and Huang, J.Journal of Healthcare Engineering, vol. 2021.
| Journal Article
2020
A deep learning approach to phase-space analysis for seizure detectionShropshire, H. and Benton, R.(pp. 501-511)
A deep learning approach to phase-space analysis for seizure detectionShropshire, H. and Benton, R.Southeast Decision Sciences Institute Annual Meeting, pp. 501-511. | Conference Proceeding
A Holistic End-to-End Prescriptive Maintenance Framework
Choubey, Suresh⋅Benton, Ryan G. and Johnsten, Tom
Data-Enabled Discovery and Applications, vol. 4. | Journal Article
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology.Li, Jian⋅Li, Jian⋅Li, Jian⋅Li, Jian⋅Zhang, Zelin⋅Zhang, Zelin⋅Zhang, Zelin⋅Zhang, Zelin⋅Li, Shengyu⋅Li, Shengyu⋅Li, Shengyu⋅Li, Shengyu⋅Benton, Ryan⋅Benton, Ryan⋅Benton, Ryan⋅Benton, Ryan⋅Huang, Yulong⋅Huang, Yulong⋅Huang, Yulong⋅Huang, Yulong⋅Kasukurthi, Mohan Vamsi⋅Kasukurthi, Mohan Vamsi⋅Mohan, Vamsi K⋅Kasukurthi, Mohan Vamsi⋅Li, Dongqi⋅Li, Dongqi⋅Li, Dongqi⋅Li, Dongqi⋅Lin, Jingwei⋅Lin, Jingwei⋅Lin, Jingwei⋅Lin, Jingwei⋅Borchert, Glen M⋅Borchert, Glen M⋅Borchert, Glen M⋅Borchert, Glen M⋅Tan, Shaobo⋅Tan, Shaobo⋅Tan, Shaobo⋅Tan, Shaobo⋅Li, Gang⋅Li, Gang⋅Li, Gang⋅Li, Gang⋅Ma, Bin⋅Ma, Bin⋅Ma, Bin⋅Ma, Bin⋅Yang, Meihong⋅Yang, Meihong⋅Yang, Meihong⋅Yang, Meihong⋅Huang, Jingshan⋅Huang, Jingshan⋅Huang, Jingshan and Huang, JingshanBMC medical informatics and decision making, vol. 20, pp. 297, December 15, 2020.
| Journal Article
Container and VM visualization for rapid incident responseShropshire, J. and Benton, R.(pp. 6397-6406)
Container and VM visualization for rapid incident responseShropshire, J. and Benton, R.Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2020-January, pp. 6397-6406. | Conference Proceeding
Decision Surfaces of Localized ClassifiersBrown, C. and Benton, R.G.