Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Setareh Zafari
Qiang Wang
Hao Mao
Peter Malec
Aditya Mandloi
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
D. K. BHATTACHARYYA
Author Info
Open Visualization
Name
Affiliation
Papers
D. K. BHATTACHARYYA
Department of Information Technology, Tezpur University, Napaam, India
29
Collaborators
Citations
PageRank
30
391
20.13
Referers
Referees
References
1104
1197
548
Search Limit
100
1000
Publications (29 rows)
Collaborators (30 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A survey of detection methods for XSS attacks.
1
0.38
2018
Real-time DDoS attack detection using FPGA.
9
0.56
2017
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric.
8
0.51
2016
Detection of Cross-Site Scripting Attack under Multiple Scenarios.
0
0.34
2015
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
22
0.89
2015
MIFS-ND: A mutual information-based feature selection method.
28
0.82
2014
Network Anomaly Detection: Methods, Systems and Tools.
208
6.22
2014
Network attacks: Taxonomy, tools and systems.
0
0.34
2014
MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method.
15
0.72
2014
Incremental association rule mining: a survey.
21
0.69
2013
An Effective Fingerprint Classification And Search Method
0
0.34
2012
Finding gene coherent patterns using PATSUB+
0
0.34
2012
Network module extraction with positive and negative co-regulation
0
0.34
2012
An Efficient Approach on Rare Association Rule Mining.
5
0.39
2012
An effective unsupervised network anomaly detection method
8
0.59
2012
A DDoS attack detection mechanism based on protocol specific traffic features
6
0.59
2012
Packet and Flow Based Network Intrusion Dataset.
20
0.85
2012
Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data.
2
0.39
2012
CNNC: a common nearest neighbour clustering approach for gene expression data
0
0.34
2011
GERC: Tree Based Clustering for Gene Expression Data
8
0.54
2011
Detection of HTTP flooding attacks in multiple scenarios
12
0.74
2011
NADO: network anomaly detection using outlier approach
10
0.72
2011
An Effective Fingerprint Verification Technique
0
0.34
2010
OPAM-An Efficient One Pass Association Mining Technique without Candidate Generation
4
0.40
2008
SCOPE: An Efficient One Pass Approach to Find Strongly Correlated Item Pairs.
2
0.40
2008
Clustering Approach to Content Based Image Retrieval
2
0.37
2006
Density-Based view materialization
0
0.34
2005
Rule mining for dynamic databases
0
0.34
2004
A New Distributed Algorithm for Large Data Clustering
0
0.34
2000
1