Folgen
Dr. Raza Nowrozy
Titel
Zitiert von
Zitiert von
Jahr
Ai-driven cybersecurity: an overview, security intelligence modeling and research directions
IH Sarker, MH Furhad, R Nowrozy
SN Computer Science 2 (3), 173, 2021
5282021
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
792023
From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
TR McIntosh, T Susnjak, T Liu, P Watters, D Xu, D Liu, R Nowrozy, ...
Computers & Security 144, 103964, 2024
692024
A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection
RC Ripan, IH Sarker, SMM Hossain, MM Anwar, R Nowrozy, MM Hoque, ...
SN Computer Science 2 (2), 112, 2021
692021
Detecting suspicious texts using machine learning techniques
O Sharif, MM Hoque, ASM Kayes, R Nowrozy, IH Sarker
Applied Sciences 10 (18), 6527, 2020
462020
Privacy preservation of electronic health records in the modern era: A systematic survey
R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh
ACM Computing Surveys 56 (8), 1-37, 2024
312024
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach
R Nowrozy, K Ahmed, H Wang, T Mcintosh
Informatics 10 (3), 60, 2023
302023
Embracing the generative ai revolution: Advancing tertiary education in cybersecurity with gpt
R Nowrozy, D Jam
arXiv preprint arXiv:2403.11402, 2024
112024
AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput. Sci. 2, 173 (2021)
IH Sarker, MH Furhad, R Nowrozy
11
AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Computer Science, 2 (3), 173
IH Sarker, MH Furhad, R Nowrozy
92021
AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput. Sci. 2 (3): 173
IH Sarker, MH Furhad, R Nowrozy
92021
A blockchain-based secure data sharing framework for healthcare
R Nowrozy, ASM Kayes, PA Watters, M Alazab, A Ng, MJM Chowdhury, ...
Blockchain for Cybersecurity and Privacy, 219-241, 2020
72020
Ai-driven cybersecurity: An overview, security intelligence modeling and research directions, SN Comput. Sci., 2 (2021), 1–18
IH Sarker, MH Furhad, R Nowrozy
6
GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute
R Nowrozy, K Ahmed, H Wang
PloS one 20 (1), e0310553, 2025
52025
Mobile deep learning: Exploring deep neural network for predicting context-aware smartphone usage
IH Sarker, YB Abushark, AI Khan, MM Alam, R Nowrozy
SN Computer Science 2 (3), 146, 2021
52021
Enhancing health information systems security: An ontology model approach
R Nowrozy, K Ahmed
International Conference on Health Information Science, 91-100, 2023
42023
A Security and Privacy Compliant Data Sharing Solution For Healthcare Data Ecosystems
R Nowrozy
Victoria University, 2024
32024
GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity
R Nowrozy
Informatics 11 (3), 45, 2024
12024
Machine Learning Model for Chronic Disease Prediction
R Nowrozy
Journal ISSN 2766, 2276, 2023
12023
Autism: Gifted Traits for a Cybersecurity Workforce
R Nowrozy
2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20