D.CS Computer Science, Colorado Technical University, 2014
MBA Business Administration, Embry-Riddle University, 1987
BS Electrical Engineering, the University of Alabama in Birmingham, 1983
Loye (Lynn) Ray is currently an Adjunct Professor at the University of the Cumberlands lecturing on topics in cybersecurity. Dr. Ray's research interests are in artificial intelligence, machine learning, neural networks, firewall design and management, intrusion detection and application/database security, network security, and software security. Current research is in the use of neural networks in intrusion detection systems. Over 40 years’ experience in information systems engineering and cybersecurity. Held positions as CIO, CISO, and IT Director. Retired US Air Force Senior Officer and has held many leadership and command assignments. Hobbies include hiking, kayaking, and astronomy.
Ray, L. L. (2015). Challenges to Multi-Layer Feed Forward Neural Networks in Intrusion Detection Systems, Issues in Information Systems 17(1). p. 89-98.
Ray, L. L. (2015). Countering cross-site scripting in a web-based application, International Journal of Strategic Information Technology and Applications 6(1). p. 58-69.
Ray, L. L. (2014). Improving Performance and Convergence Rates in Multi-Layer Feed Forward Neural Network Intrusion Detection Systems, International Journal of Strategic Information Technology, and Applications 5(3). P. 24-36.
Ray, L. L. (2014). Methodology for Detecting Advanced Persistent Threats in Oracle Databases, International Journal of Strategic Information Technology, and Applications 5(1). p. 42-53.
Ray, L. L. (2013, December). A Matrix Model for Designing and Implementing Multi-Firewall Environments, International Journal of Information Security Science 2(4). p. 119-128.
Ray, L. L. (2013, August). Security Considerations for the Spiral Development Model. International Journal of Information Management 33(4). p. 684-689.
Ray, L. L. (2013, June). Determining the Number of Hidden Neurons in a Multi-Layer Feed Forward Neural Network, Journal of Information Security Research 4(2). p. 63-70.
Ray, L. L. (2013, June). Training and Testing Anomaly-based Neural Network Intrusion Detection Systems, International Journal of Information Security Science 2(2). p. 57-63.