Secondary prevention in non-rheumatic atrial fibrillation after transient ischemic attack or minor stroke PJ Koudstall Lancet 342, 1255-1262, 1993 | 1068 | 1993 |
Usefulness of DARPA dataset for intrusion detection system evaluation C Thomas, V Sharma, N Balakrishnan Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008 | 177 | 2008 |
DDoS attack detection using fast entropy approach on flow-based network traffic J David, C Thomas Procedia Computer Science 50, 30-36, 2015 | 158 | 2015 |
Image enhancement in optical coherence tomography using deconvolution MD Kulkarni, CW Thomas, JA Izatt Electronics Letters 33 (16), 1365-1367, 1997 | 134 | 1997 |
Efficient DDoS Flood Attack Detection using Dynamic Thresholding on Flow-Based Network Traffic C Thomas | 116* | |
Detection of phishing URLs using machine learning techniques J James, L Sandhya, C Thomas 2013 international conference on control communication and computing (ICCC …, 2013 | 100 | 2013 |
Improvement in intrusion detection with advances in sensor fusion C Thomas, N Balakrishnan IEEE Transactions on Information Forensics and Security 4 (3), 542-551, 2009 | 88 | 2009 |
Ranking of machine learning algorithms based on the performance in classifying DDoS attacks RRR Robinson, C Thomas 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), 185-190, 2015 | 68 | 2015 |
Machine learning-based restart policy for CDCL SAT solvers JH Liang, C Oh, M Mathew, C Thomas, C Li, V Ganesh Theory and Applications of Satisfiability Testing–SAT 2018: 21st …, 2018 | 61 | 2018 |
ProDroid—An Android malware detection framework based on profile hidden Markov model SK Sasidharan, C Thomas Pervasive and Mobile Computing 72, 101336, 2021 | 60 | 2021 |
Performance enhancement of intrusion detection systems using advances in sensor fusion C Thomas, N Balakrishnan 2008 11th International Conference on Information Fusion, 1-7, 2008 | 55 | 2008 |
Assessing distribution network hosting capacity with the addition of soft open points LJ Thomas, A Burchill, DJ Rogers, M Guest, N Jenkins IET Digital Library, 2016 | 42* | 2016 |
Improving intrusion detection for imbalanced network traffic C Thomas Security and communication Networks 6 (3), 309-324, 2013 | 38 | 2013 |
Evaluation of mitigation methods for distributed denial of service attacks RRR Robinson, C Thomas 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA …, 2012 | 27 | 2012 |
Sensor fusion and its applications C Thomas BoD–Books on Demand, 2010 | 26 | 2010 |
Improvement in minority attack detection with skewness in network traffic C Thomas, N Balakrishnan Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2008 | 26 | 2008 |
XAI for intrusion detection system: comparing explanations based on global and local scope S Hariharan, RR Rejimol Robinson, RR Prasad, C Thomas, ... Journal of Computer Virology and Hacking Techniques 19 (2), 217-239, 2023 | 25 | 2023 |
Image enhancement in optical coherence tomography," MD Kulkarni, CW Thomas, JA Izatt Electron. Lett 33, 16, 0 | 25 | |
Explainable artificial intelligence in cybersecurity: A brief review S Hariharan, A Velicheti, AS Anagha, C Thomas, N Balakrishnan 2021 4th International Conference on Security and Privacy (ISEA-ISAP), 1-12, 2021 | 22 | 2021 |
Advanced sensor fusion technique for enhanced intrusion detection C Thomas, N Balakrishnan 2008 IEEE International Conference on Intelligence and Security Informatics …, 2008 | 21 | 2008 |