default search action
Richard J. Enbody
Person information
- affiliation: Michigan State University, East Lansing, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Pranshu Bajpai, Richard J. Enbody:
Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies. DTRAP 4(4): 57:1-57:19 (2023) - 2020
- [j20]Pranshu Bajpai, Richard J. Enbody:
Attacking Key Management in Ransomware. IT Prof. 22(2): 21-27 (2020) - [j19]Pranshu Bajpai, Richard J. Enbody:
Dissecting .NET ransomware: key generation, encryption and operation. Netw. Secur. 2020(2): 8-14 (2020) - [c43]Pranshu Bajpai, Richard J. Enbody, Betty H. C. Cheng:
Ransomware Targeting Automobiles. AutoSec@CODASPY 2020: 23-29 - [c42]Pranshu Bajpai, Richard J. Enbody:
Towards Effective Identification and Rating of Automotive Vulnerabilities. AutoSec@CODASPY 2020: 37-44 - [c41]Pranshu Bajpai, Richard J. Enbody:
Memory Forensics Against Ransomware. Cyber Security 2020: 1-8 - [c40]Pranshu Bajpai, Richard J. Enbody:
An Empirical Study of Key Generation in Cryptographic Ransomware. Cyber Security 2020: 1-8 - [c39]Pranshu Bajpai, Richard J. Enbody:
An Empirical Study of API Calls in Ransomware. EIT 2020: 443-448 - [c38]Pranshu Bajpai, Richard J. Enbody:
Preparing Smart Cities for Ransomware Attacks. ICDIS 2020: 127-133 - [c37]Pranshu Bajpai, Cody Carter, Daria Tarasova, David Ackley, Ian Masterson, Jamie Schmidt, Richard J. Enbody:
The Suitability of RSA for Bulk Data Encryption. WIFS 2020: 1-6
2010 – 2019
- 2019
- [c36]Pranshu Bajpai, Tyler Olsen, Seth Edgar, Rob McCurdy, Richard J. Enbody:
BATSense: Anomalous Security Event Detection using TBATS Machine Learning. Cyber Security 2019: 1-8 - 2018
- [j18]Pranshu Bajpai, Aditya K. Sood, Richard J. Enbody:
The art of mapping IoT devices in networks. Netw. Secur. 2018(4): 8-15 (2018) - [c35]Richard J. Enbody, Aditya K. Sood, Pranshu Bajpai:
A key-management-based taxonomy for ransomware. eCrime 2018: 1-12 - 2017
- [c34]Alex Lishinski, Aman Yadav, Richard J. Enbody:
Students' Emotional Reactions to Programming Projects in Introduction to Programming: Measurement Approach and Influence on Learning Outcomes. ICER 2017: 30-38 - [c33]Vaibhav Sharma, Richard J. Enbody:
User authentication and identification from user interface interactions on touch-enabled devices. WISEC 2017: 1-11 - 2016
- [j17]Aditya K. Sood, Sherali Zeadally, Richard J. Enbody:
An Empirical Study of HTTP-based Financial Botnets. IEEE Trans. Dependable Secur. Comput. 13(2): 236-251 (2016) - [c32]Alex Lishinski, Aman Yadav, Jon Good, Richard J. Enbody:
Learning to Program: Gender Differences and Interactive Effects of Students' Motivation, Goals, and Self-Efficacy on Performance. ICER 2016: 211-220 - [c31]Alex Lishinski, Aman Yadav, Richard J. Enbody, Jon Good:
The Influence of Problem Solving Abilities on Students' Performance on Different Assessment Tasks in CS1. SIGCSE 2016: 329-334 - 2013
- [j16]Aditya K. Sood, Richard J. Enbody, Rohit Bansal:
Dissecting SpyEye - Understanding the design of third generation botnets. Comput. Networks 57(2): 436-450 (2013) - [j15]Jared D. DeMott, Richard J. Enbody, William F. Punch:
Systematic bug finding and fault localization enhanced with input data tracking. Comput. Secur. 32: 130-157 (2013) - [j14]Aditya K. Sood, Richard J. Enbody:
Targeted Cyberattacks: A Superset of Advanced Persistent Threats. IEEE Secur. Priv. 11(1): 54-61 (2013) - [j13]Aditya K. Sood, Richard J. Enbody:
Crimeware-as-a-service - A survey of commoditized crimeware in the underground market. Int. J. Crit. Infrastructure Prot. 6(1): 28-38 (2013) - [j12]Aditya K. Sood, Rohit Bansal, Richard J. Enbody:
Cybercrime: Dissecting the State of Underground Enterprise. IEEE Internet Comput. 17(1): 60-68 (2013) - 2012
- [j11]Aditya K. Sood, Peter Greko, Richard J. Enbody:
Abusing Glype proxies: attacks, exploits and defences. Netw. Secur. 2012(12): 8-15 (2012) - 2011
- [j10]Aditya K. Sood, Richard J. Enbody:
Spying on the browser: dissecting the design of malicious extensions. Netw. Secur. 2011(5): 8-12 (2011) - [j9]Aditya K. Sood, Richard J. Enbody:
Frametrapping the framebusting defence. Netw. Secur. 2011(10): 8-12 (2011) - [c30]Jared D. DeMott, Richard J. Enbody, William F. Punch III:
Towards an automatic exploit pipeline. ICITST 2011: 323-329 - 2010
- [c29]Richard J. Enbody, William F. Punch:
Performance of python CS1 students in mid-level non-python CS courses. SIGCSE 2010: 520-523 - [c28]Aditya K. Sood, Richard J. Enbody:
The Conundrum of Declarative Security HTTP Response Headers: Lessons Learned. CollSec 2010
2000 – 2009
- 2009
- [c27]Richard J. Enbody, William F. Punch, Mark McCullen:
Python CS1 as preparation for C++ CS2. SIGCSE 2009: 116-120 - 2008
- [j8]Robert LaRose, Nora J. Rifon, Richard J. Enbody:
Promoting personal responsibility for internet safety. Commun. ACM 51(3): 71-76 (2008) - 2006
- [j7]Krerk Piromsopa, Richard J. Enbody:
Secure Bit: Transparent, Hardware Buffer-Overflow Protection. IEEE Trans. Dependable Secur. Comput. 3(4): 365-376 (2006) - [c26]Yuan Zhang, Richard J. Enbody, John R. Lloyd:
Proactive, content-aware, sensitive data protection framework for enterprises. Communication, Network, and Information Security 2006: 34-40 - 2004
- [j6]Mark Brehob, Stephen Wagner, Eric Torng, Richard J. Enbody:
Optimal Replacement Is NP-Hard for Nonstandard Caches. IEEE Trans. Computers 53(1): 73-76 (2004) - 2003
- [j5]Mark Brehob, Richard J. Enbody, Eric Torng, Stephen Wagner:
On-line Restricted Caching. J. Sched. 6(2): 149-166 (2003) - 2002
- [c25]Bruce S. Elenbogen, John E. Laird, Richard J. Enbody, Chris McDonald, Peter B. Henderson, Richard Nau, Steven L. Tanimoto:
Mathematics preparation for undergraduate degrees in computer science. SIGCSE 2002: 98-99 - 2001
- [j4]Mihai Horoi, Richard J. Enbody:
Using AMDAHL's Law as a Metric to Drive Code Parallelization: Two Case Studies. Int. J. High Perform. Comput. Appl. 15(1): 75-80 (2001) - [c24]Mark Brehob, Richard J. Enbody, Eric Torng, Stephen Wagner:
On-line restricted caching. SODA 2001: 374-383
1990 – 1999
- 1999
- [c23]Mark Brehob, Richard J. Enbody:
The Potential of Carbon-Based Memory Systems. MTDT 1999: 110-114 - 1998
- [c22]Mihai Horoi, Richard J. Enbody:
Efficient Implementation of a Lanczos Eigenvalue Solver on a Cray T3E-900. HPCN Europe 1998: 907-909 - [c21]Mihai Horoi, Richard J. Enbody:
Performance Analysis and Optimization of a Parallel Carbon Molecular Dynamic Code on a Cray T3E. ICPP 1998: 62-69 - [c20]Richard J. Enbody:
The computer architecture sequence at Michigan State University. WCAE@ISCA 1998: 6 - [c19]Richard J. Enbody, Kelley Pellini, William Moore:
Performance monitoring in advanced computer architecture. WCAE@ISCA 1998: 17 - 1997
- [c18]Charles R. Severance, Richard J. Enbody:
Comparing Gang Scheduling with Dynamic Space Sharing on Symmetric Multiprocessors Using Automatic Self-Allocating Threads (ASAT). IPPS 1997: 288- - 1996
- [j3]Charles R. Severance, Richard J. Enbody, Paul Petersen:
Managing the Overall Balance of Operating System Threads on a Multiprocessor Using Automatic Self-Allocating Threads (ASAT). J. Parallel Distributed Comput. 37(1): 106-112 (1996) - [c17]Charles R. Severance, Richard J. Enbody:
Automatic Self-Allocating Threads (ASAT) on an SGI Challenge. ICPP, Vol. 3 1996: 132-139 - 1995
- [c16]Charles R. Severance, Richard J. Enbody, Steven J. Wallach, Brad Funkhouser:
Automatic Self-Allocating Threads (ASAT) on the Convex Exemplar. ICPP (1) 1995: 24-31 - [c15]Richard J. Enbody, T. Y. Li, Xiaozhuo Yang:
A Parallel Algorithm for the Nonsymmetric Eigenvalue Problems. PP 1995: 569-570 - [c14]Richard J. Enbody, Richard Purdy, Charles R. Severance:
Dynamic Load Balancing. PP 1995: 645-646 - 1993
- [c13]William F. Punch III, Erik D. Goodman, Min Pei, Lai Chia-Shun, Paul D. Hovland, Richard J. Enbody:
Further Research on Feature Selection and Classification Using Genetic Algorithms. ICGA 1993: 557-564 - [c12]Pete Nesbeitt, Richard J. Enbody, Gregor Overney, David Tománek, Aurel Bulgac, Charles R. Severance:
A Topology- and Problem-Independent Scalable Parallel Approach to Molecular Dynamics Simulation. PPSC 1993: 170-173 - [c11]Charles R. Severance, Richard J. Enbody, David Tománek, Aurel Bulgac:
Real-Values Array Indices - An Initial Look. PPSC 1993: 979-982 - 1992
- [c10]David F. Robinson, Betty H. C. Cheng, Richard J. Enbody:
A transparent monitoring tool for shared-memory multiprocessors. COMPSAC 1992: 227-232 - [c9]Timothy S. Newman, Anil K. Jain, Richard J. Enbody:
3D object recognition: interpretation tree search on a MIMD machine. ICPR (1) 1992: 337-340 - [c8]Tyan-Shu Jou, Richard J. Enbody:
A Scalable Snoopy Coherence Scheme on Distributed Shared-Memory Multiprocessors. SC 1992: 652-660 - 1991
- [c7]Richard J. Enbody, Gary Lynn, Kwee Heong Tan:
Routing the 3-D Chip. DAC 1991: 132-137 - [c6]Suresh Chittor, Richard J. Enbody:
Predicting the Effect of Mapping on the Communication Performance of Large Multicomputers. ICPP (2) 1991: 1-4 - 1990
- [c5]Suresh Chittor, Richard J. Enbody:
Performance Degradation in Large Wormhole-Routed Interprocessor Communication Networks. ICPP (1) 1990: 424-428 - [c4]Suresh Chittor, Richard J. Enbody:
Performance evaluation of mesh-connected wormhole-routed networks for interprocessor communication in multicomputers. SC 1990: 647-657
1980 – 1989
- 1989
- [j2]Richard J. Enbody, David H. C. Du:
SPYDER: a serial/parallel goal-directed router. Integr. 7(2): 151-187 (1989) - [c3]Suresh Chittor, Richard J. Enbody:
Hypercubes Vs. 2D Meshes. PP 1989: 313-318 - 1988
- [j1]Richard J. Enbody, Hung-Chang Du:
Dynamic Hashing Schemes. ACM Comput. Surv. 20(2): 85-113 (1988) - 1987
- [c2]Richard J. Enbody, Hung-Chang Du:
General Purpose Router. DAC 1987: 637-640 - 1986
- [c1]Richard J. Enbody, David Hung-Chang Du:
Near-optimal n-layer channel routing. DAC 1986: 708-714
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint