Name
Papers
Collaborators
DHRUBA K. BHATTACHARYYA
65
77
Citations 
PageRank 
Referers 
226
27.72
576
Referees 
References 
2034
871
Search Limit
1001000
Title
Citations
PageRank
Year
UIPBC: An effective clustering for scRNA-seq data analysis without user input00.342022
<p>SNMRS: An advanced measure for Co-expression network analysis</p>00.342022
Cost Effective Method for Ransomware Detection - An Ensemble Approach.00.342021
Determining Crucial Genes Associated With Covid-19 Based On Copd Findings00.342021
Developing an effective biclustering technique using an enhanced proximity measure.00.342020
Discovering Biomarkers in Parkinson's Disease Using Module Correspondence and Pathway Information.00.342020
A Fast Self-Similarity Matrix-Based Method For Shrew Ddos Attack Detection00.342020
Degnet: Identifying Differentially Expressed Genes Using Deep Neural Network From Rna-Seq Datasets00.342019
Defeating SQL injection attack in authentication security: an experimental study00.342019
Biomarker Identification For Escc Using Integrative Dea10.362019
BicBioEC: biclustering in biomarker identification for ESCC00.342019
Comparison of Methods for Differential Co-expression Analysis for Disease Biomarker Prediction.10.432019
Defeating Cyber Attacks Due to Script Injection.00.342018
Subspace module extraction from MI-based co-expression network.00.342018
Plagiarism: Taxonomy, Tools and Detection Techniques.00.342018
THD-Tricluster: A robust triclustering technique and its application in condition specific change analysis in HIV-1 progression data.10.372018
Materialized view selection using evolutionary algorithm for speeding up big data query processing.10.352017
Complex detection from PPI data using ensemble method.00.342017
DDoS Attack Detection Using Unique Source IP Deviation.00.342017
An Unsupervised Method for Detection of XSS Attack.20.362017
An effective ensemble classification framework using random forests and a correlation based feature selection technique.20.382017
DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment.10.352017
Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters.00.342016
A Fast Gene Expression Analysis using Parallel Biclustering and Distributed Triclustering Approach.00.342016
Self-similarity based DDoS attack detection using Hurst parameter.20.402016
PDComp - An Effective PPI complex Finding Method.00.342016
FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis.30.422016
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation.40.692016
Denial of Service Attack Detection using Multivariate Correlation Analysis.00.342016
Hyperspectral Remote Sensing Classifications: A Perspective Survey100.632016
Approaches and issues in view selection for materialising in data warehouse.10.352016
Information Theoretic Approaches for Detecting Causality in Gene Regulatory Networks.00.342016
Towards Generating Real-life Datasets for Network Intrusion Detection.70.442015
Unsupervised methods for finding protein complexes from PPI networks40.422015
Strew index.00.342015
Botnet in DDoS Attacks: Trends and Challenges240.882015
Big Data Analytics in Bioinformatics: A Machine Learning Perspective70.482015
TDAC: co-expressed gene pattern finding using attribute clustering00.342015
Detecting protein complexes using connectivity among nodes in a PPI Network00.342015
Core and peripheral connectivity based cluster analysis over PPI network30.402015
Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets.00.342014
A statistical feature selection technique.20.382014
Cluster analysis of cancer data using semantic similarity, sequence similarity and biological measures.10.352014
Reconstruction of gene co-expression network from microarray data using local expression patterns.140.502014
Shifting-and-Scaling Correlation Based Biclustering Algorithm110.572014
A rough set-based effective rule generation method for classification with an application in intrusion detection20.372013
Causality Inference Techniques for In-Silico Gene Regulatory Network.20.432013
A Subspace Module Extraction Technique for Gene Expression Data.00.342013
Classification of microarray cancer data using ensemble approach.170.682013
Network Anomaly Identification Using Supervised Classifier00.342013
  • 1
  • 2