[go: up one dir, main page]

Follow
Ram Basnet
Ram Basnet
Professor of Computer Science and Cybersecurity, Colorado Mesa University
Verified email at coloradomesa.edu - Homepage
Title
Cited by
Cited by
Year
Detection of phishing attacks: A machine learning approach
R Basnet, S Mukkamala, AH Sung
Soft computing applications in industry, 373-383, 2008
3642008
Algorithmic thinking, cooperativity, creativity, critical thinking, and problem solving: exploring the relationship between computational thinking skills and academic performance
T Doleck, P Bazelais, DJ Lemay, A Saxena, RB Basnet
Journal of Computers in Education, 1-15, 2017
3172017
Predictive analytics in education: a comparison of deep learning frameworks
T Doleck, DJ Lemay, RB Basnet, P Bazelais
Education and Information Technologies 25 (3), 1951-1963, 2020
1782020
Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks
RB Basnet, R Shash, CP Johnson, L Walgren, T Doleck
Journal of Internet Services and Information Security 9 (4), 1-17, 2019
1172019
Feature selection for improved phishing detection
RB Basnet, AH Sung, Q Liu
International Conference on Industrial, Engineering and Other Applications …, 2012
992012
Towards Detecting and Classifying Malicious URLs Using Deep Learning
C Johnson, B Khadka, R Basnet, T Doleck
Journal of Wireless Mobile Network, Ubiquitous Computing, and Dependable …, 2020
922020
Rule-based phishing attack detection
RB Basnet, AH Sung, Q Liu
International conference on security and management (SAM 2011), Las Vegas, NV, 2011
912011
Dropout prediction in Moocs using deep learning and machine learning
RB Basnet, C Johnson, T Doleck
Education and Information Technologies 27 (8), 11499-11513, 2022
802022
A similarity measure for clustering and its applications
GJ Torres, RB Basnet, AH Sung, S Mukkamala, BM Ribeiro
Int J Electr Comput Syst Eng 3 (3), 164-170, 2009
752009
Learning to detect phishing URLs
RB Basnet, AH Sung, Q Liu
International Journal of Research in Engineering and Technology 3 (6), 11-24, 2014
722014
Fearing the Robot Apocalypse: Correlates of AI Anxiety
DJ Lemay, RB Basnet, T Doleck
International Journal of Learning Analytics and Artificial Intelligence for …, 2020
642020
Detection of virtual environments and low interaction honeypots
S Mukkamala, K Yendrapalli, R Basnet, MK Shankarapani, AH Sung
2007 IEEE SMC Information Assurance and Security Workshop, 92-98, 2007
612007
Classifying phishing emails using confidence-weighted linear classifiers
RB Basnet, AH Sung
International conference on information security and artificial intelligence …, 2010
592010
Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol
M Behnke, N Briner, D Cullen, K Schwerdtfeger, J Warren, R Basnet, ...
IEEE Access, 1-17, 2021
572021
Detection and characterization of DDoS attacks using time-based features
J Halladay, D Cullen, N Briner, J Warren, K Fye, R Basnet, J Bergen, ...
IEEE Access 10, 49794-49807, 2022
542022
Towards developing a tool to detect phishing URLs: A machine learning approach
RB Basnet, T Doleck
2015 IEEE International Conference on Computational Intelligence …, 2015
532015
Developing Next Generation of Innovators: Teaching Entrepreneurial Mindset Elements across Disciplines
et. al. L. Nadelson, A. D. Nageswaran Palmer, T Benton, R. Basnet
International Journal of Higher Educations 7 (5), 114-126, 2018
522018
Instructional interventions for computational thinking: Examining the link between computational thinking and academic performance
DJ Lemay, RB Basnet, T Doleck, P Bazelais, A Saxena
Computers and Education Open 2, 100056, 2021
462021
Mining learner–system interaction data: implications for modeling learner behaviors and improving overlay models
T Doleck, RB Basnet, EG Poitras, SP Lajoie
Journal of Computers in Education 2 (4), 421-447, 2015
432015
Mining web to detect phishing URLs
RB Basnet, AH Sung
2012 11th International Conference on Machine Learning and Applications 1 …, 2012
392012
The system can't perform the operation now. Try again later.
Articles 1–20