Ai-driven cybersecurity: an overview, security intelligence modeling and research directions IH Sarker, MH Furhad, R Nowrozy SN Computer Science 2 (3), 173, 2021 | 335 | 2021 |
A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection RC Ripan, IH Sarker, SMM Hossain, MM Anwar, R Nowrozy, MM Hoque, ... SN Computer Science 2 (2), 112, 2021 | 51 | 2021 |
Detecting suspicious texts using machine learning techniques O Sharif, MM Hoque, ASM Kayes, R Nowrozy, IH Sarker Applied Sciences 10 (18), 6527, 2020 | 41 | 2020 |
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters Computers & security 134, 103424, 2023 | 39 | 2023 |
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach R Nowrozy, K Ahmed, H Wang, T Mcintosh Informatics 10 (3), 60, 2023 | 19 | 2023 |
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models TR McIntosh, T Susnjak, T Liu, P Watters, R Nowrozy, MN Halgamuge arXiv preprint arXiv:2402.15770, 2024 | 14 | 2024 |
AI-driven cyber security: an overview, security intelligence modelling and research directions. SN Comput Sci 2 (3) IH Sarker, MH Furhad, R Nowrozy | 11 | 2021 |
Privacy preservation of electronic health records in the modern era: A systematic survey R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh ACM Computing Surveys 56 (8), 1-37, 2024 | 8 | 2024 |
Ai-driven cybersecurity: An overview, security intelligence modeling and research directions, SN Comput. Sci., 2 (2021), 1–18 IH Sarker, MH Furhad, R Nowrozy | 8 | |
Embracing the generative ai revolution: Advancing tertiary education in cybersecurity with gpt R Nowrozy, D Jam arXiv preprint arXiv:2403.11402, 2024 | 7 | 2024 |
A blockchain-based secure data sharing framework for healthcare R Nowrozy, ASM Kayes, PA Watters, M Alazab, A Ng, MJM Chowdhury, ... Blockchain for Cybersecurity and Privacy, 219-241, 2020 | 6 | 2020 |
Mobile deep learning: Exploring deep neural network for predicting context-aware smartphone usage IH Sarker, YB Abushark, AI Khan, MM Alam, R Nowrozy SN Computer Science 2 (3), 146, 2021 | 4 | 2021 |
Gpt, ontology, and caabac: A tripartite personalized access control model anchored by compliance, context and attribute R Nowrozy, K Ahmed, H Wang arXiv preprint arXiv:2403.08264, 2024 | 3 | 2024 |
Enhancing Health Information Systems Security: An Ontology Model Approach R Nowrozy, K Ahmed International Conference on Health Information Science, 91-100, 2023 | 3 | 2023 |
GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity R Nowrozy Preprints, 2024 | | 2024 |
A Security and Privacy Compliant Data Sharing Solution For Healthcare Data Ecosystems R Nowrozy Victoria University, 2024 | | 2024 |
Machine Learning Model for Chronic Disease Prediction R Nowrozy Journal ISSN 2766, 2276, 2023 | | 2023 |
Autism: Gifted Traits for a Cybersecurity Workforce R Nowrozy | | 2021 |
Autistic Individuals in the Workplace and Cyber Security R Nowrozy | | 2021 |