Wavelet-based multiscale statistical process monitoring: A literature review R Ganesan, TK Das, V Venkataraman IIE transactions 36 (9), 787-806, 2004 | 184 | 2004 |
Accuracy of reinforcement learning algorithms for predicting aircraft taxi-out times: A case-study of Tampa Bay departures P Balakrishna, R Ganesan, L Sherry Transportation Research Part C: Emerging Technologies 18 (6), 950-962, 2010 | 148 | 2010 |
Vulcon: A system for vulnerability prioritization, mitigation, and management KA Farris, A Shah, G Cybenko, R Ganesan, S Jajodia ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-28, 2018 | 93 | 2018 |
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning R Ganesan, S Jajodia, A Shah, H Cam ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016 | 68 | 2016 |
Optimal scheduling of cybersecurity analysts for minimizing risk R Ganesan, S Jajodia, H Cam ACM Transactions on Intelligent Systems and Technology (TIST) 8 (4), 1-32, 2017 | 64 | 2017 |
Estimating taxi-out times with a reinforcement learning algorithm P Balakrishna, R Ganesan, L Sherry, BS Levy 2008 IEEE/AIAA 27th Digital Avionics Systems Conference, 3. D. 3-1-3. D. 3-12, 2008 | 64 | 2008 |
Wavelet-based identification of delamination defect in CMP (Cu-low k) using nonstationary acoustic emission signal R Ganesan, TK Das, AK Sikder, A Kumar IEEE Transactions on Semiconductor Manufacturing 16 (4), 677-685, 2003 | 59 | 2003 |
Airport taxi-out prediction using approximate dynamic programming: intelligence-based paradigm P Balakrishna, R Ganesan, L Sherry Transportation research record 2052 (1), 54-61, 2008 | 35 | 2008 |
Detecting stealthy botnets in a resource-constrained environment using reinforcement learning S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia Proceedings of the 2017 Workshop on Moving Target Defense, 75-85, 2017 | 34 | 2017 |
System for multiresolution analysis assisted reinforcement learning approach to run-by-run control R Ganesan, TK Das, KM Ramachandran US Patent 7,672,739, 2010 | 32 | 2010 |
Fake document generation for cyber deception by manipulating text comprehensibility P Karuna, H Purohit, S Jajodia, R Ganesan, O Uzuner IEEE Systems Journal 15 (1), 835-845, 2020 | 31 | 2020 |
A methodology to measure and monitor level of operational effectiveness of a CSOC A Shah, R Ganesan, S Jajodia, H Cam International Journal of Information Security 17, 121-134, 2018 | 31 | 2018 |
Understanding tradeoffs between throughput, quality, and cost of alert analysis in a CSOC A Shah, R Ganesan, S Jajodia, H Cam IEEE Transactions on Information Forensics and Security 14 (5), 1155-1170, 2018 | 30 | 2018 |
Static sectorization approach to dynamic airspace configuration using approximate dynamic programming S Kulkarni, R Ganesan, L Sherry 2011 Integrated Communications, Navigation, and Surveillance Conference …, 2011 | 30 | 2011 |
Application of reinforcement learning algorithms for predicting taxi-out times P Balakrishna, R Ganesan, L Sherry Proceedings of the 8th ATM R&D Seminars, Napa, USA, 2009 | 29 | 2009 |
Online end point detection in CMP using SPRT of wavelet decomposed sensor data TK Das, R Ganesan, AK Sikder, A Kumar IEEE transactions on semiconductor manufacturing 18 (3), 440-447, 2005 | 28 | 2005 |
Generating hard to comprehend fake documents for defensive cyber deception P Karuna, H Purohit, R Ganesan, S Jajodia IEEE Intelligent Systems 33 (5), 16-25, 2018 | 23 | 2018 |
A multiresolution analysis-assisted reinforcement learning approach to run-by-run control R Ganesan, TK Das, KM Ramachandran IEEE transactions on automation science and engineering 4 (2), 182-193, 2007 | 22 | 2007 |
Vulnerability selection for remediation: An empirical analysis A Shah, KA Farris, R Ganesan, S Jajodia The Journal of Defense Modeling and Simulation 19 (1), 13-22, 2022 | 20 | 2022 |
A comprehensive study in data mining frameworks for intrusion detection R Venkatesan, R Ganesan, AAL Selvakumar International Journal of Advanced Computer Research 2 (7), 29-34, 2012 | 20 | 2012 |