The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Srinivas Mukkamala: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala
    Static Analyzer of Vicious Executables (SAVE). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:326-334 [Conf]
  2. Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung
    Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:10-14 [Conf]
  3. Srinivas Mukkamala, K. Yendrapalli, R. B. Basnet, Andrew H. Sung
    Detecting Coordinated Distributed Multiple Attacks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:557-562 [Conf]
  4. Andrew H. Sung, Srinivas Mukkamala
    The Feature Selection and Intrusion Detection Problems. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2004, pp:468-482 [Conf]
  5. Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung
    Website Visitor Classification Using Machine Learning. [Citation Graph (0, 0)][DBLP]
    HIS, 2004, pp:384-389 [Conf]
  6. Srinivas Mukkamala, Guadelupe I. Janoski, Andrew H. Sung
    Monitoring System Security Using Neural Networks and Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    HIS, 2001, pp:121-137 [Conf]
  7. Srinivas Mukkamala, Andrew H. Sung
    Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    HIS, 2002, pp:351-364 [Conf]
  8. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. [Citation Graph (0, 0)][DBLP]
    HIS, 2003, pp:779-788 [Conf]
  9. Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala
    Polymorphic Malicious Executable Scanner by API Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    HIS, 2004, pp:378-383 [Conf]
  10. Srinivas Mukkamala, Qingzhong Liu, Rajeev Veeraghattam, Andrew H. Sung
    Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    ICAISC, 2006, pp:951-961 [Conf]
  11. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos
    Intrusion Detection Systems Using Adaptive Regression Splines. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:26-33 [Conf]
  12. Jean-Louis Lassez, Tayfun Karadeniz, Srinivas Mukkamala
    Zoomed Clusters. [Citation Graph (0, 0)][DBLP]
    ICONIP (2), 2006, pp:824-830 [Conf]
  13. Srinivas Mukkamala, Andrew H. Sung
    A Comparative Study of Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2003, pp:570-0 [Conf]
  14. Srinivas Mukkamala, Andrew H. Sung
    Computational Intelligent Techniques for Detecting Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:616-624 [Conf]
  15. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:633-642 [Conf]
  16. Srinivas Mukkamala, Dennis Xu, Andrew H. Sung
    Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2006, pp:619-628 [Conf]
  17. Marcin Paprzycki, Ajith Abraham, Ruiyuan Guo, Srinivas Mukkamala
    Data Mining Approach for Analyzing Call Center Performance. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:1092-1101 [Conf]
  18. Srinivas Mukkamala, Andrew H. Sung
    A Distributed Agent Based IDS for Stealthy Probe Detection. [Citation Graph (0, 0)][DBLP]
    IICAI, 2003, pp:413-422 [Conf]
  19. Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala
    Fraud Detection System Based on Behavior Mining and Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    IICAI, 2005, pp:3487-3501 [Conf]
  20. A. Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung
    Disassembled code analyzer for malware (DCAM). [Citation Graph (0, 0)][DBLP]
    IRI, 2005, pp:398-403 [Conf]
  21. Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala
    Defeating the Current Steganalysis Techniques (Robust Steganography). [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:440-444 [Conf]
  22. Andrew H. Sung, Srinivas Mukkamala
    Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2003, pp:209-217 [Conf]
  23. Srinivas Mukkamala, Andrew H. Sung
    A framework for countering denial of service attacks. [Citation Graph (0, 0)][DBLP]
    SMC (4), 2004, pp:3273-3278 [Conf]
  24. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Hybrid multi-agent framework for detection of stealthy probes. [Citation Graph (0, 0)][DBLP]
    Appl. Soft Comput., 2007, v:7, n:3, pp:631-641 [Journal]
  25. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos
    Intrusion Detection Systems Using Adaptive Regression Splines [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  26. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Intrusion detection using an ensemble of intelligent paradigms. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2005, v:28, n:2, pp:167-182 [Journal]

  27. Lung Cancer Detection and Classification Using Microarray Data. [Citation Graph (, )][DBLP]


  28. Event Detection and Localization Using Sensor Networks. [Citation Graph (, )][DBLP]


  29. Estimating Monthly Production of Oil Wells. [Citation Graph (, )][DBLP]


  30. Knowledge Based Discovery of Phishing Attacks. [Citation Graph (, )][DBLP]


  31. Labeling of Cancer Cells in Sputum for the Early Detection of Lung Cancer Using Tetrakis Carboxy Phenyl Porphine (TCPP). [Citation Graph (, )][DBLP]


  32. Role of Computational Intelligence in Malware Detection and Malicious Code Analysis. [Citation Graph (, )][DBLP]


  33. Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. [Citation Graph (, )][DBLP]


  34. Signature based intrusion detection using latent semantic analysis. [Citation Graph (, )][DBLP]


  35. Gene Selection for Tumor Classification Using Microarray Gene Expression Data. [Citation Graph (, )][DBLP]


  36. Biased Support Vector Machines and Kernel Methods for Intrusion Detection. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002