关注
Dr. Raza Nowrozy
Dr. Raza Nowrozy
在 live.vu.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Ai-driven cybersecurity: an overview, security intelligence modeling and research directions
IH Sarker, MH Furhad, R Nowrozy
SN Computer Science 2 (3), 173, 2021
3352021
A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection
RC Ripan, IH Sarker, SMM Hossain, MM Anwar, R Nowrozy, MM Hoque, ...
SN Computer Science 2 (2), 112, 2021
512021
Detecting suspicious texts using machine learning techniques
O Sharif, MM Hoque, ASM Kayes, R Nowrozy, IH Sarker
Applied Sciences 10 (18), 6527, 2020
412020
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
392023
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach
R Nowrozy, K Ahmed, H Wang, T Mcintosh
Informatics 10 (3), 60, 2023
192023
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models
TR McIntosh, T Susnjak, T Liu, P Watters, R Nowrozy, MN Halgamuge
arXiv preprint arXiv:2402.15770, 2024
142024
AI-driven cyber security: an overview, security intelligence modelling and research directions. SN Comput Sci 2 (3)
IH Sarker, MH Furhad, R Nowrozy
112021
Privacy preservation of electronic health records in the modern era: A systematic survey
R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh
ACM Computing Surveys 56 (8), 1-37, 2024
82024
Ai-driven cybersecurity: An overview, security intelligence modeling and research directions, SN Comput. Sci., 2 (2021), 1–18
IH Sarker, MH Furhad, R Nowrozy
8
Embracing the generative ai revolution: Advancing tertiary education in cybersecurity with gpt
R Nowrozy, D Jam
arXiv preprint arXiv:2403.11402, 2024
72024
A blockchain-based secure data sharing framework for healthcare
R Nowrozy, ASM Kayes, PA Watters, M Alazab, A Ng, MJM Chowdhury, ...
Blockchain for Cybersecurity and Privacy, 219-241, 2020
62020
Mobile deep learning: Exploring deep neural network for predicting context-aware smartphone usage
IH Sarker, YB Abushark, AI Khan, MM Alam, R Nowrozy
SN Computer Science 2 (3), 146, 2021
42021
Gpt, ontology, and caabac: A tripartite personalized access control model anchored by compliance, context and attribute
R Nowrozy, K Ahmed, H Wang
arXiv preprint arXiv:2403.08264, 2024
32024
Enhancing Health Information Systems Security: An Ontology Model Approach
R Nowrozy, K Ahmed
International Conference on Health Information Science, 91-100, 2023
32023
GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity
R Nowrozy
Preprints, 2024
2024
A Security and Privacy Compliant Data Sharing Solution For Healthcare Data Ecosystems
R Nowrozy
Victoria University, 2024
2024
Machine Learning Model for Chronic Disease Prediction
R Nowrozy
Journal ISSN 2766, 2276, 2023
2023
Autism: Gifted Traits for a Cybersecurity Workforce
R Nowrozy
2021
Autistic Individuals in the Workplace and Cyber Security
R Nowrozy
2021
系统目前无法执行此操作,请稍后再试。
文章 1–19