Kamlesh Dutta

According to our database1, Kamlesh Dutta authored at least 49 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs.
Wirel. Pers. Commun., September, 2024

Performance evaluation of drug synergy datasets using computational intelligence approaches.
Multim. Tools Appl., January, 2024

Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review.
Int. J. Inf. Comput. Secur., 2024

2023
Semi-automatic Annotation for Mentions in Hindi Text.
SN Comput. Sci., September, 2023

Drug synergy model for malignant diseases using deep learning.
J. Bioinform. Comput. Biol., June, 2023

Generating Automated Layout Design using a Multi-population Genetic Algorithm.
J. Web Eng., 2023

SMDDH: Singleton Mention detection using Deep Learning in Hindi Text.
CoRR, 2023

A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning.
Comput. Secur., 2023

Topological and Dimensional constraints based optimal placement of Layout Entities using Clustering and Genetic Algorithm.
Appl. Soft Comput., 2023

2022
A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks.
Wirel. Pers. Commun., 2022

Artificial intelligence techniques for prediction of drug synergy in malignant diseases: Past, present, and future.
Comput. Biol. Medicine, 2022

Mention detection in coreference resolution: survey.
Appl. Intell., 2022

2021
CogramDroid-An approach towards malware detection in Android using opcode ngrams.
Concurr. Comput. Pract. Exp., 2021

A comprehensive review on feature set used for anaphora resolution.
Artif. Intell. Rev., 2021

2020
Hybrid Algorithm to Detect DDoS Attacks in VANETs.
Wirel. Pers. Commun., 2020

Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks.
Int. J. Secur. Priv. Pervasive Comput., 2020

Distributed routing for underwater wireless sensor networks using cuckoo search-ant colony optimization.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

2019
Analysis and Comparison of Neural Network Models for Software Development Effort Estimation.
J. Cases Inf. Technol., 2019

A Survey on Various Threats and Current State of Security in Android Platform.
ACM Comput. Surv., 2019

Dependability Analysis for On-Demand Computing Based Transaction Processing System.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2018

Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2018

Natural language processing for hybrid knowledge representation.
Int. J. Adv. Intell. Paradigms, 2018

2017
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN.
Int. J. Inf. Secur. Priv., 2017

2016
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges.
Secur. Commun. Networks, 2016

Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities.
Int. J. Secur. Networks, 2016

Securing Mobile Ad Hoc Networks: Challenges and Solutions.
Int. J. Handheld Comput. Res., 2016

Historical prioritisation and reprioritisations using hierarchical historical R-tree.
Int. J. Comput. Appl. Technol., 2016

2015
Requirement Prioritization of Complex Web 2.0 Application based on Effects on Regression Testing: A Hybrid Approach.
Int. J. Syst. Serv. Oriented Eng., 2015

Hybrid Regression Testing Based on Path Pruning.
Int. J. Syst. Serv. Oriented Eng., 2015

Intrusion detection technique for black hole attack in mobile ad hoc networks.
Int. J. Inf. Priv. Secur. Integr., 2015

Hybrid regression testing technique: based on requirement priorities, fault and modification history.
Int. J. Comput. Appl. Technol., 2015

2014
Current prioritisation and reprioritisation practices: a case study approach.
Int. J. Comput. Aided Eng. Technol., 2014

Requirement reprioritisation for pairwise compared requirements.
Int. J. Comput. Aided Eng. Technol., 2014

Resource Allocation in Cloud Computing Environment using AHP Technique.
Int. J. Cloud Appl. Comput., 2014

Neural network based models for software effort estimation: a review.
Artif. Intell. Rev., 2014

Semiautomatic annotation scheme for demonstrative pronoun considering indirect anaphora for Hindi.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Incremental development & revolutions of E-learning software systems in education sector: a case study approach.
Hum. centric Comput. Inf. Sci., 2013

2012
Regression Testing-Based Requirement Prioritization of Mobile Applications.
Int. J. Syst. Serv. Oriented Eng., 2012

Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Comparison of regression model, feed-forward neural network and radial basis neural network for software development effort estimation.
ACM SIGSOFT Softw. Eng. Notes, 2011

A cloud based software testing paradigm for mobile applications.
ACM SIGSOFT Softw. Eng. Notes, 2011

Machine Learning Approach for the Classification of Demonstrative Pronouns for Indirect Anaphora in Hindi News Items.
Prague Bull. Math. Linguistics, 2011

Architectural space planning using evolutionary computing approaches: a review.
Artif. Intell. Rev., 2011

Reputation-Based Trust for Mobile Agents.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2010
Probabilistic neural network approach to the classification of demonstrative pronouns for indirect anaphora in Hindi.
Expert Syst. Appl., 2010

2009
Application of Pronominal Divergence and Anaphora Resolution in English-Hindi Machine Translation.
Polibits, 2009

2004
Information Extraction from Hindi Texts.
Proceedings of the Fourth International Conference on Language Resources and Evaluation, 2004


  Loading...