Secondary prevention in non-rheumatic atrial fibrillation after transient ischemic attack or minor stroke PJ Koudstall Lancet 342, 1255-1262, 1993 | 1073 | 1993 |
Usefulness of DARPA dataset for intrusion detection system evaluation C Thomas, V Sharma, N Balakrishnan Data Mining, Intrusion detection, information assurance, and data networks …, 2008 | 185 | 2008 |
DDoS attack detection using fast entropy approach on flow-based network traffic J David, C Thomas Procedia Computer Science 50, 30-36, 2015 | 171 | 2015 |
Image enhancement in optical coherence tomography using deconvolution MD Kulkarni, CW Thomas, JA Izatt Electronics Letters 33 (16), 1365-1367, 1997 | 156 | 1997 |
Efficient DDoS Flood Attack Detection using Dynamic Thresholding on Flow-Based Network Traffic C Thomas | 137* | |
Detection of phishing URLs using machine learning techniques J James, L Sandhya, C Thomas 2013 international conference on control communication and computing (ICCC …, 2013 | 115 | 2013 |
Improvement in intrusion detection with advances in sensor fusion C Thomas, N Balakrishnan IEEE Transactions on Information Forensics and Security 4 (3), 542-551, 2009 | 88 | 2009 |
Ranking of machine learning algorithms based on the performance in classifying DDoS attacks RRR Robinson, C Thomas 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), 185-190, 2015 | 74 | 2015 |
ProDroid—An Android malware detection framework based on profile hidden Markov model SK Sasidharan, C Thomas Pervasive and Mobile Computing 72, 101336, 2021 | 68 | 2021 |
Machine learning-based restart policy for CDCL SAT solvers JH Liang, C Oh, M Mathew, C Thomas, C Li, V Ganesh Theory and Applications of Satisfiability Testing–SAT 2018: 21st …, 2018 | 67 | 2018 |
Performance enhancement of intrusion detection systems using advances in sensor fusion C Thomas, N Balakrishnan 2008 11th International Conference on Information Fusion, 1-7, 2008 | 56 | 2008 |
XAI for intrusion detection system: comparing explanations based on global and local scope S Hariharan, RR Rejimol Robinson, RR Prasad, C Thomas, ... Journal of Computer Virology and Hacking Techniques 19 (2), 217-239, 2023 | 53 | 2023 |
Assessing distribution network hosting capacity with the addition of soft open points LJ Thomas, A Burchill, DJ Rogers, M Guest, N Jenkins 5th IET International Conference on Renewable Power Generation (RPG 2016), 32, 2016 | 48* | 2016 |
Improving intrusion detection for imbalanced network traffic C Thomas Security and communication Networks 6 (3), 309-324, 2013 | 41 | 2013 |
Explainable artificial intelligence in cybersecurity: A brief review S Hariharan, A Velicheti, AS Anagha, C Thomas, N Balakrishnan 2021 4th International Conference on Security and Privacy (ISEA-ISAP), 1-12, 2021 | 34 | 2021 |
Sensor fusion and its applications C Thomas BoD–Books on Demand, 2010 | 32 | 2010 |
Improvement in minority attack detection with skewness in network traffic C Thomas, N Balakrishnan Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008 | 29 | 2008 |
Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm J David, C Thomas Journal of Parallel and Distributed Computing 152, 79-87, 2021 | 27 | 2021 |
Brain tumor detection in MRI images using adaptive-ANFIS classifier with segmentation of tumor and edema R Kalam, C Thomas, MA Rahiman Soft Computing 27 (5), 2279-2297, 2023 | 26 | 2023 |
Evaluation of mitigation methods for distributed denial of service attacks RRR Robinson, C Thomas 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA …, 2012 | 26 | 2012 |