Kiran S Balagani
TitleCited byYear
K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods
SR Gaddam, VV Phoha, KS Balagani
IEEE transactions on knowledge and data engineering 19 (3), 345-354, 2007
1812007
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
1392015
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
KS Balagani, VV Phoha, A Ray, S Phoha
Pattern Recognition Letters 32 (7), 1070-1080, 2011
642011
Dimension reduction using feature extraction methods for Real-time misuse detection systems
GK Kuchimanchi, VV Phoha, KS Balagani, SR Gaddam
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
622004
Adaptive neural network clustering of web users
SK Rangarajan, VV Phoha, KS Balagani, RR Selmic, SS Iyengar
Computer 37 (4), 34-40, 2004
602004
On the feature selection criterion based on an approximation of multidimensional mutual information
KS Balagani, VV Phoha
IEEE Transactions on pattern analysis and machine intelligence 32 (7), 1342-1343, 2010
512010
A weighted metric based adaptive algorithm for web server load balancing
DC Shadrach, KS Balagani, VV Phoha
2009 Third International Symposium on Intelligent Information Technology …, 2009
452009
Snoop-forge-replay attacks on continuous verification with keystrokes
KA Rahman, KS Balagani, VV Phoha
IEEE Transactions on information forensics and security 8 (3), 528-541, 2013
352013
Method to indentify anomalous data using cascaded K-Means clustering and an ID3 decision tree
VV Phoha, KS Balagani
US Patent 7,792,770, 2010
312010
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
KA Rahman, KS Balagani, VV Phoha
CVPR 2011 WORKSHOPS, 31-38, 2011
262011
Secure outsourced biometric authentication with performance evaluation on smartphones
J Šeděnka, S Govindarajan, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014
242014
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics
DG Brizan, A Goodkind, P Koch, K Balagani, VV Phoha, A Rosenberg
International Journal of Human-Computer Studies 82, 57-68, 2015
232015
Continuous authentication with cognition-centric text production and revision features
H Locklear, S Govindarajan, Z Sitová, A Goodkind, DG Brizan, ...
IEEE International Joint Conference on Biometrics, 1-8, 2014
202014
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data
S Govindarajan, P Gasti, KS Balagani
2013 IEEE Sixth International Conference on Biometrics: Theory, Applications …, 2013
202013
An Enhanced WLAN Security System with FPGA Implementation for Multimedia Applications
T Hayajneh, S Ullah, BJ Mohd, KS Balagani
IEEE Systems Journal 11 (4), 2536-2545, 2015
192015
Web user clustering and its application to prefetching using ART neural networks
SK Rangarajan, VV Phoha, K Balagani, RR Selmic, SS Iyengar
IEEE Computer, 45-62, 2004
192004
On inferring browsing activity on smartphones via USB power analysis side-channel
Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani
IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016
182016
Scan-based evaluation of continuous keystroke authentication systems
A Serwadda, Z Wang, P Koch, S Govindarajan, R Pokala, A Goodkind, ...
IT Professional 15 (4), 20-23, 2013
182013
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks
Z Wang, A Serwadda, KS Balagani, VV Phoha
2012 IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012
172012
Method to detect SYN flood attack
VV Phoha, KS Balagani
US Patent 7,865,954, 2011
152011
The system can't perform the operation now. Try again later.
Articles 1–20