Automated behavioral analysis of malware: A case study of wannacry ransomware Q Chen, RA Bridges 2017 16th IEEE International Conference on Machine Learning and Applications …, 2017 | 260 | 2017 |
A survey of intrusion detection systems leveraging host data RA Bridges, TR Glass-Vanderlan, MD Iannacone, MS Vincent, Q Chen ACM Computing Surveys (CSUR) 52 (6), 1-35, 2019 | 125 | 2019 |
A Model-based Approach to Self-Protection in Computing System Q Chen, S Abdelwahed, A Erradi 2013 ACM Cloud and Autonomic Computing Conference (CAC '13), 2013 | 58 | 2013 |
A Model-based Validated Autonomic Approach to Self-Protect Computing Systems C Qian, A Sherif, E Abdelkarim Internet of Things Journal, IEEE 1 (5), 446-460, 2014 | 53* | 2014 |
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification KC Roy, Q Chen Information Systems Frontiers, https://doi.org/10.1007/s10796-020-10017, 2020 | 51 | 2020 |
Automated ransomware behavior analysis: Pattern extraction and early detection Q Chen, SR Islam, H Haswell, RA Bridges Science of Cyber Security: Second International Conference, SciSec 2019 …, 2019 | 44 | 2019 |
Developing Hands-on Labware for Emerging Database Security L Li, K Qian, Q Chen, R Hasan, G Shao ACM SOGOTE/RIIT 2016. Sept. 28-Oct. 1, 2016, Boston, MA, USA, 2016 | 40 | 2016 |
A Data Integrity Verification Scheme in Mobile Cloud Computing C Lin, Z Shen, Q Chen, FT Sheldon Journal of Network and Computer Applications, 2016 | 39 | 2016 |
Towards realizing a distributed event and intrusion detection system Q Chen, HA Kholidy, S Abdelwahed, J Hamilton Future Network Systems and Security: Third International Conference, FNSS …, 2017 | 38 | 2017 |
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC) Q Chen, RK Abercrombie, FT Sheldon Journal of Artificial Intelligence and Soft Computing Research 5 (3 (2015 …, 2015 | 36 | 2015 |
Iotcop: A blockchain-based monitoring framework for detection and isolation of malicious devices in internet-of-things systems SS Seshadri, D Rodriguez, M Subedi, KKR Choo, S Ahmed, Q Chen, ... IEEE Internet of Things Journal 8 (5), 3346-3359, 2020 | 29 | 2020 |
A Model-based Approach to Self-Protection in SCADA Systems Q Chen, S Abdelwahed 9th International Workshop on Feedback Computing (Feedback Computing 14), 2014 | 29 | 2014 |
Ropgen: Towards robust code authorship attribution via automatic coding style transformation Z Li, G Chen, C Chen, Y Zou, S Xu Proceedings of the 44th International Conference on Software Engineering …, 2022 | 23 | 2022 |
High-Performance Intrusion Response Planning on Many-Core Architectures S Iannucci, Q Chen, S Abdelwahed Workshop on Network Security Analytics and Automation, colocated with the …, 2016 | 22 | 2016 |
Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design M Banerjee, J Lee, Q Chen, KKR Choo 2018 27th International Conference on Computer Communication and Networks …, 2018 | 21 | 2018 |
Towards Autonomic Security Management of Healthcare Information Systems Q Chen, J Lambright, S Abdelwahed 2016 IEEE First International Conference on Connected Health: Applications …, 2016 | 21 | 2016 |
Towards realizing self-protecting SCADA systems Q Chen, S Abdelwahed Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 21 | 2014 |
Blockchain-based automated and robust cyber security management S He, E Ficke, MMA Pritom, H Chen, Q Tang, Q Chen, M Pendleton, ... Journal of Parallel and Distributed Computing 163, 62-82, 2022 | 19 | 2022 |
Toward realizing self-protecting healthcare information systems: Design and security challenges Q Chen Advances in Computers 114, 113, 2019 | 16 | 2019 |
A safety and security architecture for reducing accidents in intelligent transportation systems Q Chen, AK Sowan, S Xu 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2018 | 16 | 2018 |