Space-efficient tracking of persistent items in a massive data stream B Lahiri, J Chandrashekar, S Tirthapura Proceedings of the 5th ACM international conference on Distributed event …, 2011 | 32 | 2011 |
Identifying frequent items in a network using gossip B Lahiri, S Tirthapura Journal of Parallel and Distributed Computing 70 (12), 1241-1253, 2010 | 23 | 2010 |
Finding correlated heavy-hitters over data streams B Lahiri, S Tirthapura 2009 IEEE 28th International Performance Computing and Communications …, 2009 | 15 | 2009 |
Identifying correlated heavy-hitters in a two-dimensional data stream B Lahiri, AP Mukherjee, S Tirthapura Data mining and knowledge discovery 30, 797-818, 2016 | 14 | 2016 |
Computing frequent elements using gossip B Lahiri, S Tirthapura Structural Information and Communication Complexity: 15th International …, 2008 | 9 | 2008 |
Stream Sampling. B Lahiri, S Tirthapura Encyclopedia of Database Systems, 2838-2842, 2009 | 8 | 2009 |
Critical threshold parameters for defining bursts in event logs B Lahiri, F Moerchen, I Akrotirianakis US Patent 8,645,311, 2014 | 5 | 2014 |
Detecting exploit patterns from network packet streams B Lahiri Iowa State University, 2012 | 4 | 2012 |
Finding critical thresholds for defining bursts B Lahiri, I Akrotirianakis, F Moerchen Data Warehousing and Knowledge Discovery: 13th International Conference …, 2011 | 2 | 2011 |
Finding critical thresholds for defining bursts in event logs B Lahiri, I Akrotirianakis, F Moerchen Transactions on Large-Scale Data-and Knowledge-Centered Systems VIII …, 2013 | 1 | 2013 |
Network Flow Data Mining for Detecting Typical Exploit Behavior B Lahiri | | |
Detecting Exploit Patterns from Network Flow Streams B Lahiri | | |
A Streaming Algorithm for Online Payload-based Network Anomaly Detection B Lahiri, Y Liu, S Tirthapura, Y Guan | | |