Follow
Arun Pujari
Title
Cited by
Cited by
Year
Data mining techniques
AK Pujari
Universities press, 2001
7302001
N-gram analysis for computer virus detection
DKS Reddy, AK Pujari
Journal in computer virology 2, 231-239, 2006
1672006
INDu: An Interval & Duration Network
AK Pujari, G Vijaya Kumari, A Sattar
Australasian Joint Conference on Artificial Intelligence, 291-303, 1999
1251999
Intrusion detection using text processing techniques with a kernel based similarity measure
A Sharma, AK Pujari, KK Paliwal
computers & security 26 (7-8), 488-495, 2007
1052007
QROCK: A quick version of the ROCK algorithm for clustering of categorical data
M Dutta, AK Mahanta, AK Pujari
Pattern Recognition Letters 26 (15), 2364-2373, 2005
1052005
Q-coverage problem in wireless sensor networks
M Chaudhary, AK Pujari
Distributed Computing and Networking: 10th International Conference, ICDCN …, 2009
812009
An intelligent character recognizer for Telugu scripts using multiresolution analysis and associative memory
AK Pujari, CD Naidu, MS Rao, BC Jinaga
Image and Vision Computing 22 (14), 1221-1227, 2004
75*2004
Intrusion detection using text processing techniques with a binary-weighted cosine metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security 1 (1), 43-50, 2006
692006
Recognition of Telugu characters using neural networks
MB Sukhaswami, P Seetharamulu, AK Pujari
International journal of neural systems 6 (03), 317-357, 1995
671995
A modified Gabor function for content based image retrieval
CS Sastry, M Ravindranath, AK Pujari, BL Deekshatulu
Pattern recognition letters 28 (2), 293-300, 2007
622007
Virtual user approach for group recommender systems using precedence relations
VR Kagita, AK Pujari, V Padmanabhan
Information Sciences 294, 15-30, 2015
572015
Collaborative filtering using multiple binary maximum margin matrix factorizations
V Kumar, AK Pujari, SK Sahu, VR Kagita, V Padmanabhan
Information Sciences 380, 1-11, 2017
532017
New Malicious Code Detection Using Variable Length n-grams
DKS Reddy, SK Dash, AK Pujari
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
502006
Conformal matrix factorization based recommender system
TVR Himabindu, V Padmanabhan, AK Pujari
Information Sciences 467, 685-707, 2018
482018
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
482006
Volume intersection with optimal set of directions
K Shanmukh, AK Pujari
Pattern Recognition Letters 12 (3), 165-170, 1991
481991
Adaptive Naive Bayes method for masquerade detection
SK Dash, KS Reddy, AK Pujari
Security and Communication Networks 4 (4), 410-417, 2011
472011
A new framework for reasoning about points, intervals and durations
AK Pujari, A Sattar
IJCAI, 1259-1267, 1999
421999
Group preserving label embedding for multi-label classification
V Kumar, AK Pujari, V Padmanabhan, VR Kagita
Pattern Recognition 90, 23-34, 2019
392019
Episode based masquerade detection
SK Dash, KS Reddy, AK Pujari
Information Systems Security: First International Conference, ICISS 2005 …, 2005
382005
The system can't perform the operation now. Try again later.
Articles 1–20