Arun Pujari
Cited by
Cited by
Data mining techniques
AK Pujari
Universities press, 2001
N-gram analysis for computer virus detection
DKS Reddy, AK Pujari
Journal in computer virology 2, 231-239, 2006
INDu: An Interval & Duration Network
AK Pujari, G Vijaya Kumari, A Sattar
Advanced Topics in Artificial Intelligence: 12th Australian Joint Conference …, 1999
Intrusion detection using text processing techniques with a kernel based similarity measure
A Sharma, AK Pujari, KK Paliwal
computers & security 26 (7-8), 488-495, 2007
QROCK: A quick version of the ROCK algorithm for clustering of categorical data
M Dutta, AK Mahanta, AK Pujari
Pattern Recognition Letters 26 (15), 2364-2373, 2005
Q-coverage problem in wireless sensor networks
M Chaudhary, AK Pujari
Distributed Computing and Networking: 10th International Conference, ICDCN …, 2009
Intrusion detection using text processing techniques with a binary-weighted cosine metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security 1 (1), 43-50, 2006
Recognition of Telugu characters using neural networks
MB Sukhaswami, P Seetharamulu, AK Pujari
International journal of neural systems 6 (03), 317-357, 1995
A modified Gabor function for content based image retrieval
CS Sastry, M Ravindranath, AK Pujari, BL Deekshatulu
Pattern Recognition Letters 28 (2), 293-300, 2007
Virtual user approach for group recommender systems using precedence relations
VR Kagita, AK Pujari, V Padmanabhan
Information Sciences 294, 15-30, 2015
Adaptive Naive Bayes method for masquerade detection
SK Dash, KS Reddy, AK Pujari
Security and Communication Networks 4 (4), 410-417, 2011
An intelligent character recognizer for Telugu scripts using multiresolution analysis and associative memory
AK Pujari, CD Naidu, MS Rao, BC Jinaga
Image and Vision Computing 22 (14), 1221-1227, 2004
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
New Malicious Code Detection Using Variable Length n-grams
DKS Reddy, SK Dash, AK Pujari
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
Volume intersection with optimal set of directions
K Shanmukh, AK Pujari
Pattern Recognition Letters 12 (3), 165-170, 1991
Collaborative filtering using multiple binary maximum margin matrix factorizations
V Kumar, AK Pujari, SK Sahu, VR Kagita, V Padmanabhan
Information Sciences 380, 1-11, 2017
A new framework for reasoning about points, intervals and durations
AK Pujari, A Sattar
IJCAI, 1259-1267, 1999
Conformal matrix factorization based recommender system
TVR Himabindu, V Padmanabhan, AK Pujari
Information Sciences 467, 685-707, 2018
Episode based masquerade detection
SK Dash, KS Reddy, AK Pujari
Information Systems Security: First International Conference, ICISS 2005 …, 2005
Progress in advanced computing and intelligent engineering
B Pati, CR Panigrahi, S Misra, AK Pujari, S Bakshi
Advances in Intelligent Systems and Computing 713, 2017
The system can't perform the operation now. Try again later.
Articles 1–20