|
Search the dblp DataBase
Srinivas Mukkamala:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala
Static Analyzer of Vicious Executables (SAVE). [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:326-334 [Conf]
- Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:10-14 [Conf]
- Srinivas Mukkamala, K. Yendrapalli, R. B. Basnet, Andrew H. Sung
Detecting Coordinated Distributed Multiple Attacks. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:557-562 [Conf]
- Andrew H. Sung, Srinivas Mukkamala
The Feature Selection and Intrusion Detection Problems. [Citation Graph (0, 0)][DBLP] ASIAN, 2004, pp:468-482 [Conf]
- Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung
Website Visitor Classification Using Machine Learning. [Citation Graph (0, 0)][DBLP] HIS, 2004, pp:384-389 [Conf]
- Srinivas Mukkamala, Guadelupe I. Janoski, Andrew H. Sung
Monitoring System Security Using Neural Networks and Support Vector Machines. [Citation Graph (0, 0)][DBLP] HIS, 2001, pp:121-137 [Conf]
- Srinivas Mukkamala, Andrew H. Sung
Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. [Citation Graph (0, 0)][DBLP] HIS, 2002, pp:351-364 [Conf]
- Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. [Citation Graph (0, 0)][DBLP] HIS, 2003, pp:779-788 [Conf]
- Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala
Polymorphic Malicious Executable Scanner by API Sequence Analysis. [Citation Graph (0, 0)][DBLP] HIS, 2004, pp:378-383 [Conf]
- Srinivas Mukkamala, Qingzhong Liu, Rajeev Veeraghattam, Andrew H. Sung
Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. [Citation Graph (0, 0)][DBLP] ICAISC, 2006, pp:951-961 [Conf]
- Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos
Intrusion Detection Systems Using Adaptive Regression Splines. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2004, pp:26-33 [Conf]
- Jean-Louis Lassez, Tayfun Karadeniz, Srinivas Mukkamala
Zoomed Clusters. [Citation Graph (0, 0)][DBLP] ICONIP (2), 2006, pp:824-830 [Conf]
- Srinivas Mukkamala, Andrew H. Sung
A Comparative Study of Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICTAI, 2003, pp:570-0 [Conf]
- Srinivas Mukkamala, Andrew H. Sung
Computational Intelligent Techniques for Detecting Denial of Service Attacks. [Citation Graph (0, 0)][DBLP] IEA/AIE, 2004, pp:616-624 [Conf]
- Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. [Citation Graph (0, 0)][DBLP] IEA/AIE, 2004, pp:633-642 [Conf]
- Srinivas Mukkamala, Dennis Xu, Andrew H. Sung
Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. [Citation Graph (0, 0)][DBLP] IEA/AIE, 2006, pp:619-628 [Conf]
- Marcin Paprzycki, Ajith Abraham, Ruiyuan Guo, Srinivas Mukkamala
Data Mining Approach for Analyzing Call Center Performance. [Citation Graph (0, 0)][DBLP] IEA/AIE, 2004, pp:1092-1101 [Conf]
- Srinivas Mukkamala, Andrew H. Sung
A Distributed Agent Based IDS for Stealthy Probe Detection. [Citation Graph (0, 0)][DBLP] IICAI, 2003, pp:413-422 [Conf]
- Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala
Fraud Detection System Based on Behavior Mining and Anomaly Detection. [Citation Graph (0, 0)][DBLP] IICAI, 2005, pp:3487-3501 [Conf]
- A. Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung
Disassembled code analyzer for malware (DCAM). [Citation Graph (0, 0)][DBLP] IRI, 2005, pp:398-403 [Conf]
- Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala
Defeating the Current Steganalysis Techniques (Robust Steganography). [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:440-444 [Conf]
- Andrew H. Sung, Srinivas Mukkamala
Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. [Citation Graph (0, 0)][DBLP] SAINT, 2003, pp:209-217 [Conf]
- Srinivas Mukkamala, Andrew H. Sung
A framework for countering denial of service attacks. [Citation Graph (0, 0)][DBLP] SMC (4), 2004, pp:3273-3278 [Conf]
- Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
Hybrid multi-agent framework for detection of stealthy probes. [Citation Graph (0, 0)][DBLP] Appl. Soft Comput., 2007, v:7, n:3, pp:631-641 [Journal]
- Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos
Intrusion Detection Systems Using Adaptive Regression Splines [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
Intrusion detection using an ensemble of intelligent paradigms. [Citation Graph (0, 0)][DBLP] J. Network and Computer Applications, 2005, v:28, n:2, pp:167-182 [Journal]
Lung Cancer Detection and Classification Using Microarray Data. [Citation Graph (, )][DBLP]
Event Detection and Localization Using Sensor Networks. [Citation Graph (, )][DBLP]
Estimating Monthly Production of Oil Wells. [Citation Graph (, )][DBLP]
Knowledge Based Discovery of Phishing Attacks. [Citation Graph (, )][DBLP]
Labeling of Cancer Cells in Sputum for the Early Detection of Lung Cancer Using Tetrakis Carboxy Phenyl Porphine (TCPP). [Citation Graph (, )][DBLP]
Role of Computational Intelligence in Malware Detection and Malicious Code Analysis. [Citation Graph (, )][DBLP]
Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. [Citation Graph (, )][DBLP]
Signature based intrusion detection using latent semantic analysis. [Citation Graph (, )][DBLP]
Gene Selection for Tumor Classification Using Microarray Gene Expression Data. [Citation Graph (, )][DBLP]
Biased Support Vector Machines and Kernel Methods for Intrusion Detection. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.008secs
|