Remote patient monitoring: a comprehensive study LP Malasinghe, N Ramzan, K Dahal Journal of Ambient Intelligence and Humanized Computing 10, 57-76, 2019 | 597 | 2019 |
Intelligent phishing detection system for e-banking using fuzzy data mining M Aburrous, MA Hossain, K Dahal, F Thabtah Expert systems with applications 37 (12), 7913-7921, 2010 | 291 | 2010 |
An adaptive ensemble classifier for mining concept drifting data streams DM Farid, L Zhang, A Hossain, CM Rahman, R Strachan, G Sexton, ... Expert Systems with Applications 40 (15), 5895-5906, 2013 | 228 | 2013 |
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN RMA Ujjan, Z Pervez, K Dahal, AK Bashir, R Mumtaz, J González Future Generation Computer Systems 111, 763-779, 2020 | 210 | 2020 |
Recommendation based trust model with an effective defence scheme for MANETs AM Shabut, KP Dahal, SK Bista, IU Awan IEEE Transactions on mobile computing 14 (10), 2101-2115, 2014 | 194 | 2014 |
Generator maintenance scheduling in power systems using metaheuristic-based hybrid approaches KP Dahal, N Chakpitak Electric power systems research 77 (7), 771-779, 2007 | 177 | 2007 |
Portfolio optimization using multi-obj ective genetic algorithms P Skolpadungket, K Dahal, N Harnpornchai 2007 IEEE Congress on Evolutionary Computation, 516-523, 2007 | 170 | 2007 |
Predicting phishing websites using classification mining techniques with experimental case studies M Aburrous, MA Hossain, K Dahal, F Thabtah 2010 seventh international conference on information technology: New …, 2010 | 158 | 2010 |
An efficient feature selection based Bayesian and Rough set approach for intrusion detection M Prasad, S Tripathi, K Dahal Applied Soft Computing 87, 105980, 2020 | 122 | 2020 |
DNS-IdM: A blockchain identity management system to secure personal data sharing in a network J Alsayed Kassem, S Sayeed, H Marco-Gisbert, Z Pervez, K Dahal Applied Sciences 9 (15), 2953, 2019 | 107 | 2019 |
Experimental case studies for investigating e-banking phishing techniques and attack strategies M Aburrous, MA Hossain, K Dahal, F Thabtah Cognitive Computation 2, 242-253, 2010 | 107 | 2010 |
Generator maintenance scheduling using a genetic algorithm with a fuzzy evaluation function KP Dahal, CJ Aldridge, JR McDonald Fuzzy Sets and Systems 102 (1), 21-29, 1999 | 100 | 1999 |
Tuning struggle strategy in genetic algorithms for scheduling in computational grids F Xhafa, B Duran, A Abraham, KP Dahal 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 92 | 2008 |
Internet of Things (IoT) a survey on architecture, enabling technologies, applications and challenges A Giri, S Dutta, S Neogy, K Dahal, Z Pervez Proceedings of the 1st international conference on internet of things and …, 2017 | 90 | 2017 |
Intelligent phishing website detection system using fuzzy techniques M Aburrous, MA Hossain, F Thabatah, K Dahal 2008 3rd International Conference on Information and Communication …, 2008 | 87 | 2008 |
Generator maintenance scheduling of electric power systems using genetic algorithms with integer representation KP Dahal, JR McDonald IET Digital Library, 1997 | 77 | 1997 |
Test data generation from UML state machine diagrams using gas C Doungsa-Ard, K Dahal, A Hossain, T Suwannasart International Conference on Software Engineering Advances (ICSEA 2007), 47-47, 2007 | 73 | 2007 |
A GA (TS) hybrid algorithm for scheduling in computational grids F Xhafa, JA Gonzalez, KP Dahal, A Abraham International Conference on Hybrid Artificial Intelligence Systems, 285-292, 2009 | 71 | 2009 |
Intelligent learning algorithms for active vibration control A Madkour, MA Hossain, KP Dahal, H Yu IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007 | 69 | 2007 |
Review on the Advancements of DNA Cryptography B Anam, K Sakib, MA Hossain, K Dahal arXiv preprint arXiv:1010.0186, 2010 | 68 | 2010 |