Jugal Kalita
Citata da
Citata da
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
Summarizing microblogs automatically
B Sharifi, MA Hutton, J Kalita
Human language technologies: The 2010 annual conference of the northá…, 2010
MIFS-ND: A mutual information-based feature selection method
N Hoque, DK Bhattacharyya, JK Kalita
Expert Systems with Applications 41 (14), 6371-6385, 2014
A survey of outlier detection methods in network anomaly identification
P Gogoi, DK Bhattacharyya, B Borah, JK Kalita
The Computer Journal 54 (4), 570-588, 2011
Syntactic normalization of twitter messages
M Kaufmann, J Kalita
International conference on natural language processing, Kharagpur, India 16, 2010
Network attacks: Taxonomy, tools and systems
N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
Comparing twitter summarization algorithms for multiple post summaries
D Inouye, JK Kalita
2011 IEEE Third international conference on privacy, security, risk andá…, 2011
Streaming trend detection in twitter
J Benhardus, J Kalita
International Journal of Web Based Communities 9 (1), 122-139, 2013
Making Them Move: Mechanics, Control & Animation of Articulated Figures
NI Badler, BA Barsky, D Zeltzer
Taylor & Francis, 2017
Experiments in microblog summarization
B Sharifi, MA Hutton, JK Kalita
2010 IEEE Second International Conference on Social Computing, 49-56, 2010
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
Botnet in DDoS Attacks: Trends and Challenges
N Hoque, DK Bhattacharyya, JK Kalita
IEEE Communications Surveys and Tutorials 17 (4), 2242-2270, 2015
Detecting distributed denial of service attacks: methods, tools and future directions
MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2014
A survey of the usages of deep learning for natural language processing
DW Otter, JR Medina, JK Kalita
IEEE Transactions on Neural Networks and Learning Systems, 2020
Network anomaly detection: A machine learning perspective
DK Bhattacharyya, JK Kalita
Crc Press, 2013
Surveying port scans and their detection methodologies
MH Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
Authentication of smartphone users using behavioral biometrics
A Alzubaidi, J Kalita
IEEE Communications Surveys & Tutorials 18 (3), 1998-2026, 2016
A comparison of algorithms for the pairwise alignment of biological networks
C Clark, J Kalita
Bioinformatics 30 (16), 2351-2359, 2014
Animation from instructions
NI Badler, BL Webber, J Esakov, J Kalita
Packet and flow based network intrusion dataset
P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita
International Conference on Contemporary Computing, 322-334, 2012
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20