Similarity based feature transformation for network anomaly detection A Nagaraja, U Boregowda, K Khatatneh, R Vangipuram, R Nuvvusetty, ... IEEE Access 8, 39184-39196, 2020 | 58 | 2020 |
PAREEKSHA: a machine learning approach for intrusion and anomaly detection A Nagaraja, S Aljawarneh, PH S Proceedings of the First International Conference on Data Science, E …, 2018 | 34 | 2018 |
UTTAMA: an intrusion detection system based on feature clustering and feature transformation A Nagaraja, B Uma, R Gunupudi Foundations of Science 25 (4), 1049-1075, 2020 | 33 | 2020 |
An extensive survey on intrusion detection-past, present, future A Nagaraja, TS Kumar Proceedings of the Fourth International Conference on Engineering & MIS 2018 …, 2018 | 16 | 2018 |
Similarity Based Feature Transformation for Network Anomaly Detection (2020) IEEE Access, 8, art. no. 9006824 A Nagaraja, U Boregowda, K Khatatneh, R Vangipuram, R Nuvvusetty, ... ICMPC 2023, 39184-39196, 0 | 14 | |
Fake news detection using machine learning methods A Nagaraja, S KN, A Sinha, JV RAJENDRA KUMAR, P Nayak International Conference on Data Science, E-learning and Information Systems …, 2021 | 13 | 2021 |
Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8 (2020), 39184–39196 A Nagaraja, U Boregowda, K Khatatneh, R Vangipuram, R Nuvvusetty, ... | 13 | 2020 |
A membership function for feature clustering based network intrusion and anomaly detection A Nagaraja, TS Kumar Proceedings of the Fourth International Conference on Engineering & MIS 2018 …, 2018 | 13 | 2018 |
A membership function for intrusion and anomaly detection of low frequency attacks A Nagaraja, VS Kiran, PH S, N Rajasekhar Proceedings of the First International Conference on Data Science, E …, 2018 | 12 | 2018 |
A survey on routing techniques for transmission of packets in networks A Nagaraja, N Mangathayaru, N Rajashekar, TS Kumar 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 10 | 2016 |
Optimization of Access Points in Wireless Sensor Networks-An Approach Towards Security A Nagaraja, S Kumar R CSOC 2015, 2015 | 10 | 2015 |
Study of Detection of DDoS attacks in cloud environment Using Regression Analysis A Nagaraja, U Boregowda, R Vangipuram International Conference on Data Science, E-learning and Information Systems …, 2021 | 9 | 2021 |
Found Sci (2019) A Nagaraja, B Uma, R Gunupudi | 8 | |
Intrusion detection using dimensionality reduced soft matrix A Nagaraja, B Uma Proceedings of the 5th International Conference on Engineering and MIS, 1-7, 2019 | 5 | 2019 |
Privacy and data security in Internet of things A Nagaraja, N Rajasekhar IADIS International Journal on Computer Science & Information Systems 12 (1 …, 2017 | 4 | 2017 |
Privacy preserving and data security—A survey A Nagaraja, N Mangathayaru, N Rajashekar 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 4 | 2016 |
A Session Key Utilization Based Approach For Memory Management in Wireless Networks A Nagaraja, SR Kumar Proceedings of the The International Conference on Engineering & MIS 2015, 1-5, 2015 | 4 | 2015 |
Fuzzy Feature Similarity Functions for Feature Clustering and Dimensionality Reduction A Nagaraja, U Boregowda, R Vangipuram International Conference on Data Science, E-learning and Information Systems …, 2021 | 3 | 2021 |
Regression analysis for network intrusion detection A Nagaraja, U Boregowda, R Vangipuram International Conference on Data Science, E-learning and Information Systems …, 2021 | 3 | 2021 |
Design of gaussian similarity measure for network anomaly detection A Nagaraja, U Boregowda, R Vangipuram, R Gunupudi International Conference on Data Science, E-learning and Information Systems …, 2021 | 3 | 2021 |