Follow
Keshav Dahal
Keshav Dahal
Professor in Intelligent Systems at the University of the West of Scotland
Verified email at uws.ac.uk
Title
Cited by
Cited by
Year
Remote patient monitoring: a comprehensive study
LP Malasinghe, N Ramzan, K Dahal
Journal of Ambient Intelligence and Humanized Computing 10, 57-76, 2019
3432019
Intelligent phishing detection system for e-banking using fuzzy data mining
M Aburrous, MA Hossain, K Dahal, F Thabtah
Expert systems with applications 37 (12), 7913-7921, 2010
2562010
An adaptive ensemble classifier for mining concept drifting data streams
DM Farid, L Zhang, A Hossain, CM Rahman, R Strachan, G Sexton, ...
Expert Systems with Applications 40 (15), 5895-5906, 2013
1872013
Recommendation based trust model with an effective defence scheme for MANETs
AM Shabut, KP Dahal, SK Bista, IU Awan
IEEE Transactions on mobile computing 14 (10), 2101-2115, 2014
1732014
Generator maintenance scheduling in power systems using metaheuristic-based hybrid approaches
KP Dahal, N Chakpitak
Electric power systems research 77 (7), 771-779, 2007
1652007
Portfolio optimization using multi-obj ective genetic algorithms
P Skolpadungket, K Dahal, N Harnpornchai
2007 IEEE Congress on Evolutionary Computation, 516-523, 2007
1432007
Predicting phishing websites using classification mining techniques with experimental case studies
M Aburrous, MA Hossain, K Dahal, F Thabtah
2010 seventh international conference on information technology: New …, 2010
1412010
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN
RMA Ujjan, Z Pervez, K Dahal, AK Bashir, R Mumtaz, J González
Future Generation Computer Systems 111, 763-779, 2020
1192020
Generator maintenance scheduling using a genetic algorithm with a fuzzy evaluation function
KP Dahal, CJ Aldridge, JR McDonald
Fuzzy Sets and Systems 102 (1), 21-29, 1999
951999
An efficient feature selection based Bayesian and Rough set approach for intrusion detection
M Prasad, S Tripathi, K Dahal
Applied Soft Computing 87, 105980, 2020
932020
Experimental case studies for investigating e-banking phishing techniques and attack strategies
M Aburrous, MA Hossain, K Dahal, F Thabtah
Cognitive Computation 2, 242-253, 2010
912010
Tuning struggle strategy in genetic algorithms for scheduling in computational grids
F Xhafa, B Duran, A Abraham, KP Dahal
2008 7th Computer Information Systems and Industrial Management Applications …, 2008
912008
Intelligent phishing website detection system using fuzzy techniques
M Aburrous, MA Hossain, F Thabatah, K Dahal
2008 3rd International Conference on Information and Communication …, 2008
772008
DNS-IdM: A blockchain identity management system to secure personal data sharing in a network
J Alsayed Kassem, S Sayeed, H Marco-Gisbert, Z Pervez, K Dahal
Applied Sciences 9 (15), 2953, 2019
752019
Generator maintenance scheduling of electric power systems using genetic algorithms with integer representation
KP Dahal, JR McDonald
IET Digital Library, 1997
751997
A GA (TS) hybrid algorithm for scheduling in computational grids
F Xhafa, JA Gonzalez, KP Dahal, A Abraham
Hybrid Artificial Intelligence Systems: 4th International Conference, HAIS …, 2009
692009
Test data generation from UML state machine diagrams using gas
C Doungsa-ard, K Dahal, A Hossain, T Suwannasart
International Conference on Software Engineering Advances (ICSEA 2007), 47-47, 2007
682007
Internet of Things (IoT) a survey on architecture, enabling technologies, applications and challenges
A Giri, S Dutta, S Neogy, K Dahal, Z Pervez
Proceedings of the 1st international conference on internet of things and …, 2017
672017
Intelligent learning algorithms for active vibration control
A Madkour, MA Hossain, KP Dahal, H Yu
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007
632007
A port system simulation facility with an optimization capability
K Dahal, S Galloway, G Burt, J Mcdonald, I Hopkins
International Journal of Computational Intelligence and Applications 3 (04 …, 2003
542003
The system can't perform the operation now. Try again later.
Articles 1–20