Ram B. Basnet

Orcid: 0000-0001-6864-6893

According to our database1, Ram B. Basnet authored at least 24 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks.
IEEE Access, 2023

2022
CMU-SynTraffic-2022.
Dataset, May, 2022

Switching intentions in the context of open-source software movement: The paradox of choice.
Educ. Inf. Technol., 2022

Dropout prediction in Moocs using deep learning and machine learning.
Educ. Inf. Technol., 2022

Detection and Characterization of DDoS Attacks Using Time-Based Features.
IEEE Access, 2022

Evaluation of Synthetic Data Generation Techniques in the Domain of Anonymous Traffic Classification.
IEEE Access, 2022

2021
Application of Deep Learning on the Characterization of Tor Traffic using Time based Features.
J. Internet Serv. Inf. Secur., 2021

Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol.
IEEE Access, 2021

2020
Towards Detecting and Classifying Malicious URLs Using Deep Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Examining the Relationship between Threat and Coping Appraisal in Phishing Detection among College Students.
J. Internet Serv. Inf. Secur., 2020

Fearing the Robot Apocalypse: Correlates of AI Anxiety.
Int. J. Learn. Anal. Artif. Intell. Educ., 2020

Predictive analytics in education: a comparison of deep learning frameworks.
Educ. Inf. Technol., 2020

2019
Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks.
J. Internet Serv. Inf. Secur., 2019

Social network analysis of twitter use during the AERA 2017 annual conference.
Educ. Inf. Technol., 2019

2018
Exploring computer science students' continuance intentions to use Kattis.
Educ. Inf. Technol., 2018

2015
The Critical Feature Dimension and Critical Sampling Problems.
Proceedings of the ICPRAM 2015, 2015

2014
Learning to Detect Phishing Webpages.
J. Internet Serv. Inf. Secur., 2014

2012
Feature Selection for Improved Phishing Detection.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Mining Web to Detect Phishing URLs.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2009
Event Detection and Localization Using Sensor Networks.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

2008
Detection of Phishing Attacks: A Machine Learning Approach.
Proceedings of the Soft Computing Applications in Industry, 2008

2007
Gene Selection for Tumor Classification Using Microarray Gene Expression Data.
Proceedings of the World Congress on Engineering, 2007

Knowledge Based Discovery of Phishing Attacks.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

Detecting Coordinated Distributed Multiple Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007


  Loading...