A survey of outlier detection methods in network anomaly identification P Gogoi, DK Bhattacharyya, B Borah, JK Kalita The Computer Journal 54 (4), 570-588, 2011 | 342 | 2011 |
An improved sampling-based DBSCAN for large spatial databases B Borah, DK Bhattacharyya International conference on intelligent sensing and information processing …, 2004 | 257 | 2004 |
Indian summer monsoon rainfall prediction using artificial neural network P Singh, B Borah Stochastic environmental research and risk assessment 27, 1585-1599, 2013 | 167 | 2013 |
Forecasting stock index price based on M-factors fuzzy time series and particle swarm optimization P Singh, B Borah International Journal of Approximate Reasoning 55 (3), 812-833, 2014 | 119 | 2014 |
Anomaly detection analysis of intrusion data using supervised & unsupervised approach. P Gogoi, B Borah, DK Bhattacharyya J. Convergence Inf. Technol. 5 (1), 95-110, 2010 | 104 | 2010 |
MLH-IDS: a multi-level hybrid intrusion detection method P Gogoi, DK Bhattacharyya, B Borah, JK Kalita The Computer Journal 57 (4), 602-623, 2014 | 97 | 2014 |
High-order fuzzy-neuro expert system for time series forecasting P Singh, B Borah Knowledge-based systems 46, 12-21, 2013 | 90 | 2013 |
An efficient time series forecasting model based on fuzzy time series P Singh, B Borah Engineering Applications of Artificial Intelligence 26 (10), 2443-2457, 2013 | 89 | 2013 |
DDSC: A density differentiated spatial clustering technique. B Borah, DK Bhattacharyya J. Comput. 3 (2), 72-79, 2008 | 76 | 2008 |
A clustering technique using density difference B Borah, DK Bhattacharyya 2007 international conference on signal processing, communications and …, 2007 | 46 | 2007 |
An effective neural network and fuzzy time series-based hybridized model to handle forecasting problems of two factors P Singh, B Borah Knowledge and information systems 38, 669-690, 2014 | 36 | 2014 |
Improvement of query-based text summarization using word sense disambiguation N Rahman, B Borah Complex & Intelligent Systems 6, 75-85, 2020 | 31 | 2020 |
A survey on existing extractive techniques for query-based text summarization N Rahman, B Borah 2015 international symposium on advanced computing and communication (ISACC …, 2015 | 21 | 2015 |
Network anomaly identification using supervised classifier P Gogoi, B Borah, DK Bhattacharyya Informatica 37 (1), 2013 | 20 | 2013 |
Outlier identification using symmetric neighborhoods P Gogoi, B Borah, DK Bhattacharyya, JK Kalita Procedia Technology 6, 239-246, 2012 | 16 | 2012 |
An unsupervised method for word sense disambiguation N Rahman, B Borah Journal of King Saud University-Computer and Information Sciences 34 (9 …, 2022 | 13 | 2022 |
A blind, semi-fragile 3d mesh watermarking algorithm using minimum distortion angle quantization index modulation (3d-mdaqim) S Borah, B Borah Arabian Journal for Science and Engineering 44 (4), 3867-3882, 2019 | 13 | 2019 |
Efficient rule set generation using rough set theory for classification of high dimensional data P Gogoi, R Das, B Borah, DK Bhattacharyya International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN, 2011 | 12 | 2011 |
Network anomaly detection using unsupervised model P Gogoi, B Borah, DK Bhattacharyya International Journal of Computer Applications (Special Issue on Network …, 2011 | 10 | 2011 |
Prediction error expansion (PEE) based reversible polygon mesh watermarking scheme for regional tamper localization S Borah, B Borah Multimedia Tools and Applications 79, 11437-11458, 2020 | 9 | 2020 |