A review of fraud detection techniques: Credit card K Chaudhary, J Yadav, B Mallick International Journal of Computer Applications 45 (1), 39-44, 2012 | 191 | 2012 |
A study of time series models ARIMA and ETS G Jain, B Mallick International Journal of Modern Education and Computer Science, 2017 | 143 | 2017 |
Load balancing in cloud computing using dynamic load management algorithm R Panwar, B Mallick 2015 International Conference on Green Computing and Internet of Things …, 2015 | 111 | 2015 |
A Comparative of Load Balancing Algorithm In Cloud Computing R Panwar, B Mallick International Journal of Computer Applications (0975–8887) 117 (24), 33-37, 2015 | 44* | 2015 |
Deep learning-based sequential pattern mining for progressive database A Jamshed, B Mallick, P Kumar Soft Computing- A Fusion of Foundations, Methodologies and Applications 24 …, 2020 | 40 | 2020 |
Impact of gray hole attack in VANET S Verma, B Mallick, P Verma 2015 1st International conference on next generation computing technologies …, 2015 | 28 | 2015 |
A reliable tactic for detecting black hole attack in vehicular ad hoc networks I Dhyani, N Goel, G Sharma, B Mallick Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016 …, 2017 | 24 | 2017 |
Comparative performance analysis of MANET routing protocols in military operation using NS2 S Katiyar, R Gujral, B Mallick 2015 international conference on green computing and internet of things …, 2015 | 22 | 2015 |
Incremental mining of sequential patterns: Progress and challenges B Mallick, D Garg, PS Grover Intelligent Data Analysis 17 (3), 507-530, 2013 | 22 | 2013 |
A review on weather forecasting techniques G Jain, B Mallick International Journal of Advanced Research in Computer and Communication …, 2016 | 20 | 2016 |
Exploration of Data Mining Techniques in Fraud Detection:Credit card K Chaudhary, B Mallick International Journal of Electronics and Computer Science Engineering …, 2012 | 20* | 2012 |
Credit Card Fraud: The study of its impact and detection techniques K Chaudhary, B Mallick International Journal of Computer Science and Network (IJCSN) 1 (4), 31-35, 2012 | 17 | 2012 |
Performance evaluation of MAC protocol for IEEE 802.11, 802. 11Ext. WLAN and IEEE 802.15. 4 WPAN using NS-2 D Bhaskar, B Mallick International Journal of Computer Applications 119 (16), 25-30, 2015 | 15 | 2015 |
Constraint-based sequential pattern mining: a pattern growth algorithm incorporating compactness, length and monetary. B Mallick, D Garg, PS Grover Int. Arab J. Inf. Technol. 11 (1), 33-42, 2014 | 14 | 2014 |
Customer Purchasing Behavior using Sequential Pattern Mining Technique A Goel, B Mallick International Journal of Computer Applications 119 (1), 24 - 31, 2015 | 11 | 2015 |
Web Mining: Characteristics and application in ecommerce J Yadav, B Mallick International Journal of Electronics and Computer Science Engineering 1 (4 …, 2012 | 11 | 2012 |
A study on the use of non-parametric tests for experimentation with cluster analysis D Singh, B Mallick International Journal of Innovative Technology and Exploring Engineering 3 (4), 2013 | 10 | 2013 |
CFM-PrefixSpan: A pattern growth algorithm incorporating compactness and monetary B Mallick, D Garg, PS Grover International Journal of Innovative Computing, Information and Control 8 (7), 2012 | 10 | 2012 |
An Analysis of Sequential Pattern Mining Approach for Progressive Database by Deep Learning Technique A Jamshed, B Mallick Proceedings of the Sixth International Conference on Intelligent Computing …, 2022 | 9 | 2022 |
SVM and naïve bayes network traffic classification using correlation information D Tiwari, B Mallick International Journal of Computer Applications 147 (3), 2016 | 9 | 2016 |