92 Publications (Page 1 of 4)
2024
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead. Information
. | Journal Article
2023
Detection of Ethereum Eclipse Attack based on Hybrid Method and Dynamic Weighted Entropy
Bhumichai, D. and Benton, R.
(pp. 779-786)
 
Feature Extraction of Network Traffic in Ethereum Blockchain Network Layer for Eclipse Attack Detection
Bhumichai, D. and Benton, R.
(pp. 869-876)
2022
Computational framework for generating synthetic signal peptides
Johnsten, T.Prakash, A.Daly, G.T.Benton, R.G. and Clark, T.
 
Profiling CPU Behavior for Detection of Android Ransomware
Cabral, R.McDonald, J.T.Hively, L.M. and Benton, R.G.
Conference Proceedings - IEEE SOUTHEASTCON, vol. 2022-March, pp. 690-697. | Conference Proceeding
 
The Intersection of Persuasive System Design and Personalization in Mobile Health: Statistical Evaluation. JMIR mHealth and uHealth
2021
A metabolomic endotype of bioenergetic dysfunction predicts mortality in critically ill patients with acute respiratory failure
Langley, Raymond JLangley, Raymond JLangley, Raymond J.Migaud, Marie EMigaud, Marie E.Migaud, Marie EFlores, LoriFlores, LoriFlores, LoriThompson, J WillThompson, J. WillWill, Thompson JKean, Elizabeth A.Kean, Elizabeth AKean, Elizabeth AMostellar, Murphy M.Mostellar, Murphy MMostellar, Murphy MMowry, MatthewMowry, MatthewMowry, MatthewLuckett, PatrickLuckett, PatrickLuckett, PatrickPurcell, Lina DPurcell, Lina D.Purcell, Lina DLovato, JamesLovato, JamesLovato, JamesGandotra, SheetalGandotra, SheetalBenton, RyanBenton, RyanBenton, RyanFiles, D ClarkFiles, D. ClarkClark, Files DHarrod, Kevin SHarrod, Kevin SHarrod, Kevin S.Gillespie, Mark NGillespie, Mark NGillespie, Mark N.Morris, Peter EMorris, Peter E and Morris, Peter E.
. | Journal Article
 
A method for computationally constructing eukaryotic synthetic signal peptide sequences
Daly, G.T.Prakash, A.Benton, R.G. and Johnsten, T.
 
Classifying Android Applications Via System Stats
Hightower, J.Glisson, W.B.Benton, R. and McDonald, J.T.
(pp. 5388-5394)
 
Detecting deception using machine learning
Delgado, A.A.C.Glisson, W.B.Shashidhar, N.McDonald, J.T.Grispos, G. and Benton, R.
Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2020-January, pp. 7122-7131. | Conference Proceeding
 
Detecting deception using machine learning
Delgado, A.A.C.Glisson, W.B.Shashidhar, N.McDonald, J.T.Grispos, G. and Benton, R.
(pp. 7122-7131)
 
Insight from a containerized Kubernetes workload introspection
Watts, T.Benton, R.Bourrie, D. and Shropshire, J.
(pp. 6955-6964)
 
Insight from a Containerized Kubernetes Workload Introspection
Watts, ThomasBenton, RyanShropshire, Jordan and Bourrie, David
Hawaii International Conference on System Sciences. | Conference Proceeding
 
Machine learning-based android malware detection using manifest permissions
McDonald, J.T.Herron, N.Glisson, W.B. and Benton, R.K.
(pp. 6976-6985)
 
Machine Learning-Based Android Malware Detection Using Manifest Permissions
Mcdonald, JeffreyHerron, NathanGlisson, William and Benton, Ryan
Hawaii International Conference on System Sciences. | Conference Proceeding
 
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Mink, Dustin M.McDonald, JeffreyBagui, SikhaGlisson, William B.Shropshire, JordanBenton, Ryan and Russ, Samuel
Big Data and Cognitive Computing, vol. 5, pp. 27. | Journal Article
 
RARE: Rare Action Rule Exploration
Johns, B.A.Benton, R.G.Johnsten, T. and Bourrie, D.M.
(pp. 2603-2610)
 
Utilizing Machine Learning Techniques to Predict the Efficacy of Aerobic Exercise Intervention on Young Hypertensive Patients Based on Cardiopulmonary Exercise Testing
Huang, F.Huang, FangwanLeng, XiuyuLeng, X.Kasukurthi, Mohan VamsiKasukurthi, M.V.Huang, Y.Huang, YulongLi, D.Li, DongqiTan, S.Tan, ShaoboLu, GuiyingLu, G.Lu, JuhongLu, J.Benton, R.G.Benton, Ryan GBorchert, G.M.Borchert, Glen MHuang, Jingshan and Huang, J.
Journal of Healthcare Engineering, vol. 2021. | Journal Article
2020
A deep learning approach to phase-space analysis for seizure detection
Shropshire, H. and Benton, R.
(pp. 501-511)
 
A deep learning approach to phase-space analysis for seizure detection
Shropshire, H. and Benton, R.
Southeast Decision Sciences Institute Annual Meeting, pp. 501-511. | Conference Proceeding
 
A Holistic End-to-End Prescriptive Maintenance Framework
Choubey, SureshBenton, Ryan G. and Johnsten, Tom
Data-Enabled Discovery and Applications, vol. 4. | Journal Article
 
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology.
Li, JianLi, JianLi, JianLi, JianZhang, ZelinZhang, ZelinZhang, ZelinZhang, ZelinLi, ShengyuLi, ShengyuLi, ShengyuLi, ShengyuBenton, RyanBenton, RyanBenton, RyanBenton, RyanHuang, YulongHuang, YulongHuang, YulongHuang, YulongKasukurthi, Mohan VamsiKasukurthi, Mohan VamsiMohan, Vamsi KKasukurthi, Mohan VamsiLi, DongqiLi, DongqiLi, DongqiLi, DongqiLin, JingweiLin, JingweiLin, JingweiLin, JingweiBorchert, Glen MBorchert, Glen MBorchert, Glen MBorchert, Glen MTan, ShaoboTan, ShaoboTan, ShaoboTan, ShaoboLi, GangLi, GangLi, GangLi, GangMa, BinMa, BinMa, BinMa, BinYang, MeihongYang, MeihongYang, MeihongYang, MeihongHuang, JingshanHuang, JingshanHuang, Jingshan and Huang, Jingshan
BMC medical informatics and decision making, vol. 20, pp. 297, December 15, 2020. | Journal Article
 
Container and VM visualization for rapid incident response
Shropshire, J. and Benton, R.
(pp. 6397-6406)
 
Container and VM visualization for rapid incident response
Shropshire, J. and Benton, R.
Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2020-January, pp. 6397-6406. | Conference Proceeding
 
Decision Surfaces of Localized Classifiers
Brown, C. and Benton, R.G.