15 results on '"Kalita, J. K."'
Search Results
2. BicBioEC: biclustering in biomarker identification for ESCC
3. Denial of Service Attack Detection using Multivariate Correlation Analysis.
4. E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric.
5. Information metrics for low-rate DDoS attack detection: A comparative evaluation.
6. An effective unsupervised network anomaly detection method.
7. NADO.
8. Intersected coexpressed subcube miner: An effective triclustering algorithm.
9. RODD: An Effective Reference-Based Outlier Detection Technique for Large Datasets.
10. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions.
11. Network Anomaly Detection: Methods, Systems and Tools.
12. CA-KEP : A Secure CA Based 2-Party Key Exchange Protocol.
13. Detecting protein complexes based on a combination of topological and biological properties in protein-protein interaction network.
14. An effective graph-based clustering technique to identify coherent patterns from gene expression data.
15. Computational modelling and simulation of the immune system.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.