Varun Dutt

According to our database1, Varun Dutt authored at least 36 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




AI in Healthcare: Time-Series Forecasting Using Statistical, Neural, and Ensemble Architectures.
Frontiers Big Data, 2020

Medicine Expenditure Prediction via a Variance- Based Generative Adversarial Network.
IEEE Access, 2020

An Online Low-Cost System for Air Quality Monitoring, Prediction, and Warning.
Proceedings of the Distributed Computing and Internet Technology, 2020

HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

Behavioral Cybersecurity: Investigating the influence of Patching Vulnerabilities in Markov Security Games via Cognitive Modeling.
Int. J. Cyber Situational Aware., 2019

Applications of Statistical and Machine Learning Time-Series Methods for Predicting Internet Usage.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2019

Comparative Analysis of Features Selection Techniques for Classification in Healthcare.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2019

Virtual-Reality Training Under Varying Degrees of Task Difficulty in a Complex Search-and-Shoot Scenario.
Proceedings of the Intelligent Human Computer Interaction - 11th International Conference, 2019

Modeling Decisions in Collective Risk Social Dilemma Games for Climate Change Using Reinforcement Learning.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2019

Social-network analysis in healthcare: analysing the effect of weighted influence in physician networks.
Netw. Model. Anal. Health Informatics Bioinform., 2018

Understanding Cyber Situational Awareness in a Cyber Security Game involving.
Int. J. Cyber Situational Aware., 2018

Indirect Visual Displays: Influence of Field-of-Views and Target-Distractor Base-Rates on Decision-Making in a Search-and-Shoot Task.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Evaluating Frequent-Set Mining Approaches in Machine-Learning Problems with Several Attributes: A Case Study in Healthcare.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

Interactive Landslide Simulator: Role of Contextual Feedback in Learning Against Landslide Risks.
Proceedings of the Intelligent Human Computer Interaction - 10th International Conference, 2018

Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.
Hum. Factors, 2017

Data-mining medications for pain: analyzing adoption behavior of physicians and switching behavior of patients.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Modeling the effects of amount and timing of deception in simulated network scenarios.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

Social-Network Analysis for Pain Medications: Influential physicians may not be high-volume prescribers.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Comparing Ocular Parameters for Cognitive Load Measurement in Eye-Gaze-Controlled Interfaces for Automotive and Desktop Computing Environments.
Int. J. Hum. Comput. Interact., 2016

Applying Data Mining to Healthcare: A Study of Social Network of Physicians and Patient Journeys.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Cybersecurity: Effect of information availability in security games.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

Looking from the hacker's perspective: Role of deceptive strategies in cyber security.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

A Cognitive Model of Dynamic Cooperation With Varied Interdependency Information.
Cogn. Sci., 2015

Effect of Road Conditions on Gaze-Control Interface in an Automotive Environment.
Proceedings of the Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture, 2015

Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Environment-Adaptive Learning: How Clustering Helps to Obtain Good Training Data.
Proceedings of the KI 2014: Advances in Artificial Intelligence, 2014

Understanding Human Driving Behavior through Computational Cognitive Modeling.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

Validating instance-based learning mechanisms outside of ACT-R.
J. Comput. Sci., 2013

Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection.
Int. J. Trust. Manag. Comput. Commun., 2013

Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory.
Hum. Factors, 2013

Making Instance-based Learning Theory usable and understandable: The Instance-based Learning Tool.
Comput. Hum. Behav., 2012

A Loser Can Be a Winner: Comparison of Two Instance-based Learning Models in a Market Entry Competition.
Games, 2011

A generic dynamic control task for behavioral research and education.
Comput. Hum. Behav., 2011

Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Modeling Social Information in Conflict Situations through Instance-Based Learning Theory.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011