Similarity based feature transformation for network anomaly detection A Nagaraja, U Boregowda, K Khatatneh, R Vangipuram, R Nuvvusetty, ... IEEE Access 8, 39184-39196, 2020 | 67 | 2020 |
UTTAMA: an intrusion detection system based on feature clustering and feature transformation A Nagaraja, B Uma, R Gunupudi Foundations of Science 25 (4), 1049-1075, 2020 | 36 | 2020 |
An energy efficient and scalable endpoint linked green content caching for Named Data Network based Internet of Things HS Shrisha, U Boregowda Results in Engineering 13, 100345, 2022 | 30 | 2022 |
Similarity Based Feature Transformation for Network Anomaly Detection (2020) IEEE Access, 8, art. no. 9006824 A Nagaraja, U Boregowda, K Khatatneh, R Vangipuram, R Nuvvusetty, ... ICMPC 2023, 39184-39196, 0 | 14 | |
Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8 (2020), 39184–39196 A Nagaraja, U Boregowda, K Khatatneh, R Vangipuram, R Nuvvusetty, ... | 13 | 2020 |
A hybrid task scheduler for DAG applications on a cluster of processors U Boregowda, VR Chakravarthy 2014 Fourth International Conference on Advances in Computing and …, 2014 | 12 | 2014 |
Study of Detection of DDoS attacks in cloud environment Using Regression Analysis A Nagaraja, U Boregowda, R Vangipuram International Conference on Data Science, E-learning and Information Systems …, 2021 | 10 | 2021 |
Found Sci (2019) A Nagaraja, B Uma, R Gunupudi | 8 | |
A fully labelled image dataset of banana leaves deficient in nutrients P Sunitha, B Uma, S Channakeshava, S Babu Data in Brief 48, 109155, 2023 | 7 | 2023 |
Intrusion detection using dimensionality reduced soft matrix A Nagaraja, B Uma Proceedings of the 5th International Conference on Engineering and MIS, 1-7, 2019 | 5 | 2019 |
Fuzzy Feature Similarity Functions for Feature Clustering and Dimensionality Reduction A Nagaraja, U Boregowda, R Vangipuram International Conference on Data Science, E-learning and Information Systems …, 2021 | 4 | 2021 |
Multiple DAG applications scheduling on a cluster of processors U Boregowda, V Chakravarthy International Conference on Computer Science, Engineering and Applications …, 2014 | 4 | 2014 |
Quality-of-service-linked privileged content-caching mechanism for named data networks S HS, U Boregowda Future Internet 14 (5), 157, 2022 | 3 | 2022 |
Regression analysis for network intrusion detection A Nagaraja, U Boregowda, R Vangipuram International Conference on Data Science, E-learning and Information Systems …, 2021 | 3 | 2021 |
Design of gaussian similarity measure for network anomaly detection A Nagaraja, U Boregowda, R Vangipuram, R Gunupudi International Conference on Data Science, E-learning and Information Systems …, 2021 | 3 | 2021 |
A generalized research study on distance measures, learning algorithms and datasets A Nagaraja, B Uma Proceedings of the 5th International Conference on Engineering and MIS, 1-7, 2019 | 3 | 2019 |
A Practical Approach to Make Computer Laboratory Courses more Effective and Interesting through Student Mentoring U Boregowda, P Sunitha, AG Kiran Journal of Engineering Education Transformations 31 (1), 2017 | 3 | 2017 |
Recent trends and challenges in campus placements of engineering institutions BB Neelakantappa, CS Babu, UBA Vinod Journal of Engineering Education Transformations 31 (Special Issue), 2018 | 2 | 2018 |
A Convolution Neural Network with Skip Connections (CNNSC) approach for detecting micronutrients boron and iron deficiency in banana leaves P Sunitha, B Uma, A Geetha Kiran, S Channakeshava, CS Suresh Babu Journal of Umm Al-Qura University for Engineering and Architecture, 1-19, 2024 | 1 | 2024 |
Alumni mentoring programme U Boregowda, D Shruthi, M Vinutha, G Sudharshan, H Chandrashekar, ... Journal of Engineering Education Transformations 31 (3), 124-128, 2018 | 1 | 2018 |