Research

Research Interests
- Phishing attack detection
- Data science and applications
- Network and web application security
- Computer Science education
Google Scholar
ResearchGate
Ungergraduate CS Research
PUBLICATIONS
Modeling students’ intentions to learn data science: Using an extended theory of planned behavior R. B. Basnet, D. J. Lemay, & P. Bazelais Knowledge Management & E-Learning, 16(4), pp. 638–652, 2024, https://doi.org/10.34105/j.kmel.2024.16.029 |
Forecasting Bitcoin Returns via Machine Learning Algorithms with Technical and Economic Indicators Yen-Sheng Lee and Ram Basnet In Proc. of the 2024 International Conference in Management Sciences and Decision Making, May 2024, Taiwan |
BIE: Binary Image Encoding for the Classification of Tabular Data James Halladay, Drake Cullen, Nathan Briner, Darrin Miller, Riley Primeau, Abraham Avilla, Warin Watson, Ram Basnet, and Tenzin Doleck Journal of Data Science, pp. 1-21, 2024, doi: 10.6339/24-JDS1122 |
Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks Nathan Briner, Drake Cullen, James Halladay, Darrin Miller, Riley Primeau, Abraham Avilla, Ram Basnet, and Tenzin Doleck IEEE Access, vol. 11, pp. 113100-113113, 2023, doi: 10.1109/ACCESS.2023.3323927 |
Evaluation of Synthetic Data Generation Techniques in the Domain of Anonymous Traffic Classification Drake Cullen, James Halladay, Nathan Briner, Ram Basnet, Jeremy Bergen, and Tenzin Doleck IEEE Access, vol. 10, pp. 129612-129625, 2022, doi: 10.1109/ACCESS.2022.3228507 |
Dropout prediction in Moocs using deep learning and machine learning Ram Basnet, Clayton Johnson and Tenzin Doleck Education and Information Technologies, SpringerLink, May 2022, DOI: 10.1007/s10639-022-11068-7 |
Detection and Characterization of DDoS Attacks using Time-based Features James Halladay, Drake Cullen, Nathan Briner, Jackson Warren, Karson Fye, Ram Basnet, Jeremy Bergen, and Tenzin Doleck IEEE Access, Vol. 10, pp. 1-14, May 2022, DOI: 10.1109/ACCESS.2022.3173319 |
Instructional interventions for computation thinking: Examining the link between computation thinking and academic performance D. J. Lemay, R. B. Basnet, T. Doleck, P. Bazelais, A. Saxena Computer and Education Open, Elsevier, Vol. 2, Dec. 2021, DOI: 10.1016/j.caeo.2021.100056 |
Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol M. Behnke, N. Briner, D. Cullen, K. Schwerdtfeger, J. Warren, R. Basnet and T. Doleck IEEE Access, Vol. 9, pp. 129902-129916, Sept. 2021, DOI: 10.1109/ACCESS.2021.3113294 |
Switching intentions in the context of open-source software movement: The paradox of choice D. J. Lemay, R. Basnet, T. Doleck Education and Inforamtion Technologies, SpringerLink, July 2021 |
Application of Deep Learning on the Characterization of Tor Traffic using Time based Features C. Johnson, B. Khadka, E. Ruiz., J. Halladay, T. Doleck, and R. Basnet JISIS - Journal of Internet Services and Information Security, pp. 44-63, Vol. 11, No. 1, March 2021 |
Towards Detecting and Classifying Malicious URLs Using Deep Learning C. Johnson, B. Khadka, R. B. Basnet, and T. Doleck Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(4):31-48, Dec. 2020 DOI:10.22667/JOWUA.2020.12.31.031 |
Fearing the Robot Apocalypse: Correlates of AI Anxiety D. J. Lemay, R. B. Basnet, and T. Doleck iJAI - International Journal of Learning Analytics and Artificial Intelligence for Education, Vol. 2, No. 2, pp. 24-33, Aug. 2020 |
Examining the Relationship between Threat and Coping Appraisal in Phishing Detection among College Students D.J. Lemay, R.B. Basnet, and T. Doleck Journal of Internet Services and Information Security, Vol. 10, No. 1, pp. 38-49, Mar. 2020 |
Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks R.B. Basnet, R. Shash, C. Johnson, L. Walgren, and T. Doleck Journal of Internet Services and Information Security, Vol. 9, No. 4, pp. 1-17, Nov. 2019 |
Predictive analytics in education - a comparison of deep learning frameworks T. Doleck, D.J. Lemay, R.B. Basnet, and P. Bazelais Education and Inforamtion Technologies, SpringerLink, pp. 1-13, Nov. 2019 |
Social network analysis of twitter use during the AERA 2017 annual conference D.J. Lemay, R.B. Basnet, T. Doleck, and P. Bazelais Education and Information Technologies, Springer US 24(1) 459-470, Jan. 2019 |
Developing Next Generation of Innovators - Teaching Entrepreneurial Mindset Elements across Disciplines L.S. Nadelson, A. Palmer, T. Benton, R. Basnet, M. Bissonette, et al. International Journal of Higher Education, Sept. 2018 |
Exploring Bimodality in Introductory Computer Science Performance Distributions R.B. Basnet, L.K. Payne, T. Doleck, D.J. Lemay, and P. Bazelais EURASIA Journal of Mathematics, Science and Technology Education, July 2018, 14(10) |
Exploring computer science students' continuance intentions to use Kattis R.B. Basnet, T.Doleck, D.J. Lemay, and P. Bazelais Journal of Computers in Education, Springer, Oct. 2017 |
Algorithmic thinking, cooperativity, creativity, critical thinking, and problem solving - exploring the relationship between computational thinking skills and academic performance T. Doleck, P. Bazelais, D.J. Lemay, A. Saxena, and R.B. Basnet Journal of Computers in Education, Springer, Aug. 2017 |
Mining learner-system interaction data- implications for modeling learner behaviors and improving overlay models T. Doleck, R. Basnet, E. Poitras, and S. Lajoie Journal of Computers in Education, Springer, Aug. 2015 |
Towards examining learner behaviors in a medical intelligent tutoring system - A Hidden Markov Model approach T. Doleck, R. Basnet, E. Poitras, S. Lajoie In Proc. of the 2015 IEEE International Conference on Advance Computing Conference (IACC 2015), June 2015, Banglore, India |
The Critical Feature Dimension and Critical Sampling Problems B. M. Ribeiro, A. Sung, D. Suryakumar, and R. Basnet In Proc. of the International Conference on Pattern Recognition Applications and Methods (ICPRAM 2015), January 2015, Lisbon, Protugal. |
Towards Developing a Tool to Detect Phishing URLs- A Machine Learning Approach Basnet, R.B. and Doleck, T. In Proc. of 2015 IEEE International Conference on Computational Intelligence & Communication Technology (CICT), Feb. 2015 |
Exploring the Link Between Initial and Final Diagnosis in a Medical Intelligent Tutoring System Doleck, T., Basnet, R. B., Poitras, E., and Lajoie, S. In Proc. of IEEE International Conference on MOOC, Innovation and Technology in Education (MITE) India IEEE 2014 |
BioWorldParser - A Suite of Parsers for Leveraging Educational Data Mining Techniques Doleck, T., Basnet, R. B., Poitras, E., and Lajoie, S. In Proc. of IEEE International Conference on MOOC, Innovation and Technology in Education (MITE), India, IEEE, 2014 |
Augmenting the Novice-Expert Overlay Model in an Intelligent Tutoring System - Using Confidence-Weighted Linear Classifiers Tenzin Doleck, Ram B. Basnet, Eric Poitras and Susan Lajoie In Proceedings of IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), Tamil Nadu, India, 2014. |
Learning to Detect Phishing Webpages Ram B. Basnet and Andrew H. Sung JISIS - Journal of Internet Services and Information Security, pp. 21-39, Vol. 3, No. 4, August, 2014 |
Learning to Detect Phishing URLs Ram B. Basnet, Andrew H. Sung, and Quingzhong Liu IJRET - International Journal of Research in Engineering and Technology, Vol. 3, Issue 6, June 2014 |
Mining Web to Detect Phishing URLs Ram B. Basnet and Andrew H. Sung In Proc. of the 11th International Conference on Machine Learning and Applications (ICMLA), pp. 568-573. Boca Raton, FL, USA 2012 |
Feature Selection for Improved Phishing Detection Ram B. Basnet, Andrew H. Sung, and Quingzhong Liu In Proc. of the 25th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA/AIE 2012), pp. 252-261. Dalian, China, Jun. 2012 |
Rule-Based Phishing Attack Detection Ram B. Basnet, Andrew H. Sung, and Quingzhong Liu In Proc. of the International Conference on Security and Management-SAM'11, pp. 624-630, Las Vegas, NV, USA, Jul. 2011 |
Classifying Phishing Emails Using Confidence-Weighted Linear Classifiers Ram B. Basnet and Andrew H. Sung In Proc. of the International Conference on Information Security and Artificial Intelligence (ISAI 2010), Vol. 1, pp. 108-112. Chengdu, China, Dec. 2010 |
Event Detection and Localization Using Sensor Networks Ram B. Basnet and Srinivas Mukkamala In Proc. of International Conference on Wireless Networks, Vol. II, pp. 103-108, Las Vegas, Nevada, USA, Jul. 2009 |
A Similarity Measure for Clustering and its Applications Guadalupe J. Torres, Ram B. Basnet, Andrew H. Sung, and Srinivas Mukkamala In Proc. of World Academy of Science, Engineering and Technology, Vol. 31, ISSN 1307-6884, pp.490-496, Vienna, Austria, July 2008. |
Translation Based Arabic Text Categorization Madhu K. Shankarapani, Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung, and Bernardete M. Ribeiro In Proc. of 2nd International Conference on Information Systems Technology and Management, 2008. |
Detection of Phishing Attacks - A Machine Learning Approach Ram B. Basnet, Srinivas Mukkamala, and Andrew. H. Sung Soft Computing Applications in Industry, Springer, pp. 373-383, 2008. |
Detecting Coordinated Distributed Multiple Attacks S. Mukkamala, K. Yendrapalli, R. B. Basnet, and A. H. Sung In Proc. 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Vol. 1, Niagara Falls, Canada, May 2007. |
Detection of Virtual Environments and Low Interaction Honeypots S. Mukkamala, K. Yendrapalli, R. B. Basnet, M. K. Shankarpani, and A. H. Sung Information Assurance and Security Workshop, IEEE SMC, Vol. 1, pp. 92-98, West Point, NY, June 2007. |