Author of the publication

GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits.

, , , and . ICIS, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Mining of Frequent Items Coupled with Weight and /or Support over Progressive Databases., , and . ICDEM, volume 6411 of Lecture Notes in Computer Science, page 309-316. Springer, (2010)VIDPSO: Victim item deletion based PSO inspired sensitive pattern hiding algorithm for dense datasets., and . Inf. Process. Manag., 57 (5): 102255 (2020)Unsupervised outlier detection in streaming data using weighted clustering., and . ISDA, page 947-952. IEEE, (2012)Species identification based on approximate matching., , and . Bangalore Compute Conf., page 30. ACM, (2011)Privacy Preserving Sequential Pattern Mining in Progressive Databases Using Noisy Data., , and . IV, page 456-460. IEEE Computer Society, (2009)Closed Itemset based Sensitive Pattern Hiding for Improved Data Utility and Scalability., , and . IEEE BigData, page 4026-4035. IEEE, (2020)A Novel Rough Set Based Clustering Approach for Streaming Data., and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 1253-1265. Springer, (2012)Using Moments for Feature Extraction from Time Series Data.. SEDE, page 109-114. ISCA, (2008)Data Decomposition Based Learning for Load Time-Series Forecasting., and . PKDD/ECML Workshops, volume 1323 of Communications in Computer and Information Science, page 62-74. Springer, (2020)E-CAP: An Extended Capability Based Mechanism to Limit Distributed Denial of Service Attacks., , , , and . ICETET, page 1244-1249. IEEE Computer Society, (2008)