Now showing items 1-20 of 39

    • A gene selection method for GeneChip array data with small sample sizes 

      Chen, Zhongxue; Liu, Qingzhong; McGee, Monnie; Kong, Megan; Huang, Xudong; Deng, Youpin; Scheuermann, Richard H. (2010-07)
      In microarray experiments with small sample sizes, it is a challenge to estimate p-values accurately and decide cutoff p-values for gene selection appropriately. Although permutation-based methods have proved to have ...
    • A Logic Approach to Granular computing 

      Bing, Zhou; Yiyu, Yao (International Journal of Cognitive Informatics and Natural Intelligence, 2008-04)
      Granular computing is an emerging field of study that attempts to formalize and explore methods and heuristics of human problem solving with multiple levels of granularity and abstraction. A fundamental issue of granular ...
    • A new statistical approach to combining p-values using gamma distribution and its application to genome-wide association study 

      Liu, Qingzhong; Chen, Zhongxue; Yang, William; Yang, Jack Y; Li, Jing; Yang, Mary Qu (BMC Bioinformatics, 2014-12-16)
      Background: Combining information from different studies is an important and useful practice in bioinformatics, including genome-wide association study, rare variant data analysis and other set-based analyses. Many statistical ...
    • Android System Partition to Traffic Data? 

      Bing, Zhou; Liu, Qingzhong; Byrd, Brittany (International Journal of Knowledge Engineering, 2017-12)
      The familiarity and prevalence of mobile devices inflates their use as instruments of crime. Law enforcement personnel and mobile forensics investigators, are constantly battling to gain the upper-hand at developing a ...
    • Assessment of gene order computing methods for Alzheimer’s disease 

      Liu, Qingzhong; Hu, Benqiong; Pang, Chaoyang; Wang, Shipend; Chen, Zhongxue; Vanderburg, Charles R; Rogers, Jack T.; Deng, Youping; Huang, Xudong; Jiang, Gang (BMC Medical Genomics, 2013-01-23)
      Background: Computational genomics of Alzheimer disease (AD), the most common form of senile dementia, is a nascent field in AD research. The field includes AD gene clustering by computing gene order which generates higher ...
    • Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices 

      Hodges, Bronwyn J.; McDonald, J. Todd; Glisson, William Bradley; Jacobs, Michael; Van Devender, Maureen; Pardue, J. Harold (Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
      The escalating integration of network-enabled medical devices raises concerns for both practitioners and academics in terms of introducing new vulnerabilities and attack vectors. This prompts the idea that combining medical ...
    • Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices 

      Luckett, Patrick; McDonald, J. Todd; Glisson, William Bradley (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
      The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used ...
    • A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices 

      Grispos, George; Glisson, William Bradley; Cooper, Peter (Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
      The integration of medical devices in everyday life prompts the idea that these devices will increasingly have evidential value in civil and criminal proceedings. However, the investigation of these devices presents new ...
    • Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics 

      Grispos, George; Storer, Tim; Glisson, William Bradley (International Journal of Digital Crime and Forensics, 2012-04)
      Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying ...
    • CDBFIP: Common Database Forensic Investigation Processes for Internet of Things 

      Al-Dhaqm, Arafat; Razak, Shukor; Othman, Siti Hajar; Choo, Kim-Kwang Raymond; Glisson, William Bradley; Ali, Abulalem; Abrar, Mohammad (IEEE Access, 2017-10)
      Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment. Although the concept of database forensics has been around for ...
    • Cloud Forecasting: Legal Visibility Issues in Saturated Environments 

      Brown, Adam J.; Glisson, William Bradley; Andel, Todd R.; Choo, Kim-Kwang Raymond (Computer Law & Security Review, 2018)
      The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ...
    • Comparison of feature selection and classification for MALDI-MS data 

      Liu, Qingzhong; Sung, Andrew H.; Chen, Zhongxue; Yang, Jack Y; Qiao, Mengyu; Yang, Mary Qu; Huang, Xudong; Deng, Youping (BMC Genomics, 2009-07-07)
      Introduction: In the classification of Mass Spectrometry (MS) proteomics data, peak detection, feature selection, and learning classifiers are critical to classification accuracy. To better understand which methods are ...
    • A Comparison Study using Stegexpose for Steganalysis. 

      Olson, Eric; Carter, Larry; Liu, Qingzhong (International Journal of Knowledge Engineering, 2017-06)
      Steganography is the art of hiding secret message in innocent digital data files. Steganalysis aims to expose the existence of steganograms. While internet applications and social media has grown tremendously in recent ...
    • Detecting Deception Using Machine Learning 

      Ceballos Delgado, Alberto Alejandro; Glisson, William Bradley; Shashidhar, Narasimha; McDonald, J. Todd; Grispos, George; Benton, Ryan (Proceedings of the 54th Hawaii International Conference on System Sciences, 2021-01)
      Today’s digital society creates an environment potentially conducive to the exchange of deceptive information. The dissemination of misleading information can have severe consequences on society. This research investigates ...
    • Detecting Repackaged Android Applications Using Perceptual Hashing 

      Nguyen, Thanh; McDonald, J. Todd; Glisson, William Bradley; Andel, Todd R. (Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
      The last decade has shown a steady rate of Android device dominance in market share and the emergence of hundreds of thousands of apps available to the public. Because of the ease of reverse engineering Android applications, ...
    • Exploitation and Detection of a Malicious Mobile Application 

      Nguyen, Thanh; McDonald, J. Todd; Glisson, William Bradley (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
      Mobile devices are increasingly being embraced by both organizations and individuals in today’s society. Specifically, Android devices have been the prominent mobile device OS for several years. This continued amalgamation ...
    • Feature Selection and Classification of MAQC-II Breast Cancer and Multiple Myeloma Microarray Gene Expression Data 

      Liu, Qingzhong; Sung, Andrew H.; Chen, Zhongxue; Huang, Xudong; Deng, Youpin; Liu, Jianzhong (PLoS ONE, 2009-12-11)
      Microarray data has a high dimension of variables but available datasets usually have only a small number of samples, thereby making the study of such datasets interesting and challenging. In the task of analyzing microarray ...
    • Gene selection and classification for cancer microarray data based on machine learning and similarity measures 

      Liu, Qingzhong; Sung, Andrew H.; Chen, Zhongxue; Liu, Jianzhong; Chen, Lei; Deng, Youpin; Wang, Zhaohui; Huang, Xudong; Qiao, Mengyu (BMC Genomics, 2011)
      Background: Microarray data have a high dimension of variables and a small sample size. In microarray data analyses, two important issues are how to choose genes, which provide reliable and good prediction for disease ...
    • How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations 

      Grispos, George; Glisson, William Bradley; Storer, Tim (Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
      An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, ...
    • Identifying stealth malware using CPU power consumption and learning algorithms 

      Lucket, Patrick; McDonald, J. Todd; Glisson, William Bradley; Benton, Ryan; Dawson, Joel; Doyle, Blair A. (Journal of Computer Security, 2018)
      With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...