Author of the publication

VDMR-DBSCAN: Varied Density MapReduce DBSCAN.

, and . BDA, volume 9498 of Lecture Notes in Computer Science, page 134-150. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of Dimensionality Reduction for Intrusion Detection., , and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 306-320. Springer, (2007)Email recipient prediction using reverse chronologically arranged implicit groups., and . IC3, page 461-466. IEEE Computer Society, (2014)Mining API Calls and Permissions for Android Malware Detection., and . CANS, volume 8813 of Lecture Notes in Computer Science, page 191-205. Springer, (2014)New Malicious Code Detection Using Variable Length n-grams., , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 276-288. Springer, (2006)VDMR-DBSCAN: Varied Density MapReduce DBSCAN., and . BDA, volume 9498 of Lecture Notes in Computer Science, page 134-150. Springer, (2015)Episode Based Masquerade Detection., , and . ICISS, volume 3803 of Lecture Notes in Computer Science, page 251-262. Springer, (2005)An Adaptive Equilibrium Optimizer based Technique for Optimal Allocation of D-STATCOM in a Reconfigured Distribution Network., , and . OCIT, page 466-471. IEEE, (2021)Optimal Placement and Sizing of Distributed Generation in Radial Distribution System Using Differential Evolution Algorithm., , and . SEMCCO, volume 7677 of Lecture Notes in Computer Science, page 133-142. Springer, (2012)