Dhruba Kumar Bhattacharyya

According to our database1, Dhruba Kumar Bhattacharyya authored at least 115 papers between 1994 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Determining crucial genes associated with COVID-19 based on COPD Findings<sup>✶, ✶✶</sup>.
Comput. Biol. Medicine, 2021

Cost Effective Method for Ransomware Detection: An Ensemble Approach.
Proceedings of the Distributed Computing and Internet Technology, 2021

2020
(Differential) Co-Expression Analysis of Gene Expression: A Survey of Best Practices.
IEEE ACM Trans. Comput. Biol. Bioinform., 2020

Differential Expression Analysis of RNA-seq Reads: Overview, Taxonomy, and Tools.
IEEE ACM Trans. Comput. Biol. Bioinform., 2020

Developing an effective biclustering technique using an enhanced proximity measure.
Netw. Model. Anal. Health Informatics Bioinform., 2020

A fast self-similarity matrix-based method for shrew DDoS attack detection.
Inf. Secur. J. A Glob. Perspect., 2020

2019
Pre-Processing: A Data Preparation Step.
Proceedings of the Encyclopedia of Bioinformatics and Computational Biology - Volume 1, 2019

Biomarker Identification for Cancer Disease Using Biclustering Approach: An Empirical Study.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

BicBioEC: biclustering in biomarker identification for ESCC.
Netw. Model. Anal. Health Informatics Bioinform., 2019

Granger Causality in TCP Flooding Attack.
Int. J. Netw. Secur., 2019

Defeating SQL injection attack in authentication security: an experimental study.
Int. J. Inf. Sec., 2019

Active learning to detect DDoS attack using ranked features.
Comput. Commun., 2019

Comparison of Methods for Differential Co-expression Analysis for Disease Biomarker Prediction.
Comput. Biol. Medicine, 2019

Biomarker Identification for ESCC Using Integrative DEA.
Proceedings of the Pattern Recognition and Machine Intelligence, 2019

DEGnet: Identifying Differentially Expressed Genes Using Deep Neural Network from RNA-Seq Datasets.
Proceedings of the Pattern Recognition and Machine Intelligence, 2019

2018
A survey of detection methods for XSS attacks.
J. Netw. Comput. Appl., 2018

Defeating Cyber Attacks Due to Script Injection.
Int. J. Netw. Secur., 2018

Subspace module extraction from MI-based co-expression network.
Int. J. Bioinform. Res. Appl., 2018

Plagiarism: Taxonomy, Tools and Detection Techniques.
CoRR, 2018

THD-Tricluster: A robust triclustering technique and its application in condition specific change analysis in HIV-1 progression data.
Comput. Biol. Chem., 2018

A Dataset of Single-Hand Gestures of Sattriya Dance.
Proceedings of the Heritage Preservation - A Computational Approach, 2018

2017
Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools
Computer Communications and Networks, Springer, ISBN: 978-3-319-65186-6, 2017

An effective ensemble classification framework using random forests and a correlation based feature selection technique.
Trans. GIS, 2017

Complex detection from PPI data using ensemble method.
Netw. Model. Anal. Health Informatics Bioinform., 2017

Materialized view selection using evolutionary algorithm for speeding up big data query processing.
J. Intell. Inf. Syst., 2017

An Unsupervised Method for Detection of XSS Attack.
Int. J. Netw. Secur., 2017

DDoS Attack Detection Using Unique Source IP Deviation.
Int. J. Netw. Secur., 2017

DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment.
CoRR, 2017

Real-time DDoS attack detection using FPGA.
Comput. Commun., 2017

mRMR+: An Effective Feature Selection Algorithm for Classification.
Proceedings of the Pattern Recognition and Machine Intelligence, 2017

2016
Hyperspectral Remote Sensing Classifications: A Perspective Survey.
Trans. GIS, 2016

FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis.
Secur. Commun. Networks, 2016

Self-similarity based DDoS attack detection using Hurst parameter.
Secur. Commun. Networks, 2016

E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric.
Secur. Commun. Networks, 2016

Big data analytics in bioinformatics: architectures, techniques, tools and issues.
Netw. Model. Anal. Health Informatics Bioinform., 2016

A multi-step outlier-based anomaly detection approach to network-wide traffic.
Inf. Sci., 2016

Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation.
Int. J. Netw. Secur., 2016

Approaches and issues in view selection for materialising in data warehouse.
Int. J. Bus. Inf. Syst., 2016

A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection.
Pattern Recognit. Lett., 2015

Detecting protein complexes using connectivity among nodes in a PPI Network.
Netw. Model. Anal. Health Informatics Bioinform., 2015

Unsupervised methods for finding protein complexes from PPI networks.
Netw. Model. Anal. Health Informatics Bioinform., 2015

Strew index.
Netw. Model. Anal. Health Informatics Bioinform., 2015

Towards Generating Real-life Datasets for Network Intrusion Detection.
Int. J. Netw. Secur., 2015

TDAC: co-expressed gene pattern finding using attribute clustering.
Int. J. Bioinform. Res. Appl., 2015

Big Data Analytics in Bioinformatics: A Machine Learning Perspective.
CoRR, 2015

Botnet in DDoS Attacks: Trends and Challenges.
IEEE Commun. Surv. Tutorials, 2015

Detection of Cross-Site Scripting Attack under Multiple Scenarios.
Comput. J., 2015

Core and peripheral connectivity based cluster analysis over PPI network.
Comput. Biol. Chem., 2015

2014
Shifting-and-Scaling Correlation Based Biclustering Algorithm.
IEEE ACM Trans. Comput. Biol. Bioinform., 2014

Cluster analysis of cancer data using semantic similarity, sequence similarity and biological measures.
Netw. Model. Anal. Health Informatics Bioinform., 2014

An effective measure corresponding to biological significance.
Netw. Model. Anal. Health Informatics Bioinform., 2014

A statistical feature selection technique.
Netw. Model. Anal. Health Informatics Bioinform., 2014

Network attacks: Taxonomy, tools and systems.
J. Netw. Comput. Appl., 2014

MIFS-ND: A mutual information-based feature selection method.
Expert Syst. Appl., 2014

Network Anomaly Detection: Methods, Systems and Tools.
IEEE Commun. Surv. Tutorials, 2014

MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method.
Comput. J., 2014

Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions.
Comput. J., 2014

Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets.
Comput. Informatics, 2014

Reconstruction of gene co-expression network from microarray data using local expression patterns.
BMC Bioinform., 2014

A Similarity Measure for Clustering Gene Expression Data.
Proceedings of the Applied Algorithms - First International Conference, 2014

Information metrics for low-rate DDoS attack detection: A comparative evaluation.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
Incremental association rule mining: a survey.
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., 2013

CoBi: Pattern Based Co-Regulated Biclustering of Gene Expression Data.
Pattern Recognit. Lett., 2013

Classification of microarray cancer data using ensemble approach.
Netw. Model. Anal. Health Informatics Bioinform., 2013

Network Anomaly Identification using Supervised Classifier.
Informatica (Slovenia), 2013

A rough set-based effective rule generation method for classification with an application in intrusion detection.
Int. J. Secur. Networks, 2013

Mining strongly correlated item pairs in large transaction databases.
Int. J. Data Min. Model. Manag., 2013

Fusion of Fingerprint and Iris Biometrics Using Binary Ant Colony Optimization.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Multiobjective Differential Evolution Algorithm Using Binary Encoded Data in Selecting Views for Materializing in Data Warehouse.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2013

A Subspace Module Extraction Technique for Gene Expression Data.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

Causality Inference Techniques for <i>In-Silico</i> Gene Regulatory Network.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2013

2012
A grid-density based technique for finding clusters in satellite image.
Pattern Recognit. Lett., 2012

Module extraction from subspace co-expression networks.
Netw. Model. Anal. Health Informatics Bioinform., 2012

AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach.
Int. J. Netw. Secur., 2012

An effective graph-based clustering technique to identify coherent patterns from gene expression data.
Int. J. Bioinform. Res. Appl., 2012

An Effective Fingerprint Classification and Search Method
CoRR, 2012

An effective method for network module extraction from microarray data.
BMC Bioinform., 2012

Anomaly based intrusion detection using meta ensemble classifier.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data.
Proceedings of the Advances in Knowledge-Based and Intelligent Information and Engineering Systems, 2012

An effective unsupervised network anomaly detection method.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Finding gene coherent patterns using PATSUB+.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Packet and Flow Based Network Intrusion Dataset.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

Network module extraction with positive and negative co-regulation.
Proceedings of the Second International Conference on Computational Science, 2012

Discretization in gene expression data analysis: a selected survey.
Proceedings of the Second International Conference on Computational Science, 2012

A DDoS attack detection mechanism based on protocol specific traffic features.
Proceedings of the Second International Conference on Computational Science, 2012

An Efficient Approach on Rare Association Rule Mining.
Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012), 2012

2011
A pattern matching approach for clustering gene expression data.
Int. J. Data Min. Model. Manag., 2011

CNNC: a common nearest neighbour clustering approach for gene expression data.
Int. J. Comput. Vis. Robotics, 2011

Survey on Incremental Approaches for Network Anomaly Detection.
Int. J. Commun. Networks Inf. Secur., 2011

A Survey of Outlier Detection Methods in Network Anomaly Identification.
Comput. J., 2011

Surveying Port Scans and Their Detection Methodologies.
Comput. J., 2011

SATCLUS: An Effective Clustering Technique for Remotely Sensed Images.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

An Effective Density-Based Hierarchical Clustering Technique to Identify Coherent Patterns from Gene Expression Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Detection of HTTP flooding attacks in multiple scenarios.
Proceedings of the 2011 International Conference on Communication, 2011

NADO: network anomaly detection using outlier approach.
Proceedings of the 2011 International Conference on Communication, 2011

GERC: Tree Based Clustering for Gene Expression Data.
Proceedings of the 11th IEEE International Conference on Bioinformatics and Bioengineering, 2011

2010
Anomaly Detection Analysis of Intrusion Data Using Supervised & Unsupervised Approach.
J. Convergence Inf. Technol., 2010

An Effective Method for Fingerprint Classification.
Int. Arab. J. e Technol., 2010

An Effective Fingerprint Verification Technique
CoRR, 2010

DisClus: A Distributed Clustering Technique over High Resolution Satellite Data.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

2009
Privacy Preserving Data Mining Using Matrix Algebraic Approach.
J. Convergence Inf. Technol., 2009

A new approach for clustering gene expression time series data.
Int. J. Bioinform. Res. Appl., 2009

An Incremental Clustering of Gene Expression Data.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

2008
DDSC : A Density Differentiated Spatial Clustering Technique.
J. Comput., 2008

OPAM-An Efficient One Pass Association Mining Technique without Candidate Generation.
J. Convergence Inf. Technol., 2008

DGDCT: A Distributed Grid-Density Based Algorithm for Intrinsic Cluster Detection over Massive Spatial Data.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

SCOPE: An Efficient One Pass Approach to Find Strongly Correlated Item Pairs.
Proceedings of the 2008 International Conference on Information Technology, 2008

2006
Clustering Approach to Content Based Image Retrieval.
Proceedings of the 2006 International Conference on Geometric Modeling and Imaging, 2006

2005
Rule Mining for Dynamic Databases.
Australas. J. Inf. Syst., 2005

Density-Based View Materialization.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

Image Retrieval by Content Using Segmentation Approach.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

An Approach to Find Embedded Clusters Using Density Based Techniques.
Proceedings of the Distributed Computing and Internet Technology, 2005

2000
A New Distributed Algorithm for Large Data Clustering.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2000

1994
Stepless PWM speed control of AC motors: A neural network approach.
Neurocomputing, 1994


  Loading...