Arun Pujari
Title
Cited by
Cited by
Year
Data mining techniques
AK Pujari
Universities press, 2001
6022001
N-gram analysis for computer virus detection
DKS Reddy, AK Pujari
Journal in Computer Virology 2 (3), 231-239, 2006
1432006
INDu: An Interval & Duration Network
AK Pujari, GV Kumari, A Sattar
Australasian Joint Conference on Artificial Intelligence, 291-303, 1999
1181999
Intrusion detection using text processing techniques with a kernel based similarity measure
A Sharma, AK Pujari, KK Paliwal
computers & security 26 (7-8), 488-495, 2007
1012007
QROCK: A quick version of the ROCK algorithm for clustering of categorical data
M Dutta, AK Mahanta, AK Pujari
Pattern Recognition Letters 26 (15), 2364-2373, 2005
852005
Intrusion detection using text processing techniques with a binary-weighted cosine metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security 1 (1), 43-50, 2006
682006
Q-coverage problem in wireless sensor networks
M Chaudhary, AK Pujari
International Conference on Distributed Computing and Networking, 325-330, 2009
642009
Recognition of Telugu characters using neural networks
MB Sukhaswami, P Seetharamulu, AK Pujari
International journal of neural systems 6 (03), 317-357, 1995
601995
A modified Gabor function for content based image retrieval
CS Sastry, M Ravindranath, AK Pujari, BL Deekshatulu
Pattern Recognition Letters 28 (2), 293-300, 2007
572007
Adaptive Naive Bayes method for masquerade detection
SK Dash, KS Reddy, AK Pujari
Security and Communication Networks 4 (4), 410-417, 2011
492011
New Malicious Code Detection Using Variable Length n-grams
DKS Reddy, SK Dash, AK Pujari
International Conference on Information Systems Security, 276-288, 2006
472006
An intelligent character recognizer for Telugu scripts using multiresolution analysis and associative memory
AK Pujari, CD Naidu, MS Rao, BC Jinaga
Image and Vision Computing 22 (14), 1221-1227, 2004
472004
Volume intersection with optimal set of directions
K Shanmukh, AK Pujari
Pattern Recognition Letters 12 (3), 165-170, 1991
461991
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
432006
Virtual user approach for group recommender systems using precedence relations
VR Kagita, AK Pujari, V Padmanabhan
Information Sciences 294, 15-30, 2015
422015
A new framework for reasoning about points, intervals and durations
AK Pujari, A Sattar
IJCAI, 1259-1267, 1999
411999
Texture element feature characterizations for CBIR
K Jalaja, C Bhagvati, BL Deekshatulu, AK Pujari
Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium …, 2005
382005
Collaborative filtering using multiple binary maximum margin matrix factorizations
V Kumar, AK Pujari, SK Sahu, VR Kagita, V Padmanabhan
Information Sciences 380, 1-11, 2017
352017
Episode based masquerade detection
SK Dash, KS Reddy, AK Pujari
International Conference on Information Systems Security, 251-262, 2005
352005
A wavelet based multiresolution algorithm for rotation invariant feature extraction
CS Sastry, AK Pujari, BL Deekshatulu, C Bhagvati
Pattern Recognition Letters 25 (16), 1845-1855, 2004
332004
The system can't perform the operation now. Try again later.
Articles 1–20