Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Vir V. Phoha
2010 – today
- 2013
[j24]Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David-Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani: Scan-Based Evaluation of Continuous Keystroke Authentication Systems. IT Professional 15(4): 20-23 (2013)
[j23]Khandaker A. Rahman, Kiran S. Balagani, Vir V. Phoha: Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes. IEEE Transactions on Information Forensics and Security 8(3): 528-541 (2013)
[j22]Justin L. Rice, Vir V. Phoha, Philip Robinson: Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. IEEE Transactions on Information Forensics and Security 8(6): 963-972 (2013)
[j21]Abdul Serwadda, Vir V. Phoha: Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings. ACM Trans. Inf. Syst. Secur. 16(2): 8 (2013)
[c21]David Irakiza, Md E. Karim, Vir V. Phoha: A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality. NDSS 2013- 2012
[j20]Nitin Kanaskar, Remzi Seker, Jiang Bian, Vir V. Phoha: Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs. IEEE Transactions on Systems, Man, and Cybernetics, Part C 42(6): 1579-1589 (2012)
[c20]Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha: A prediction based approach to IP traceback. LCN Workshops 2012: 1022-1029- 2011
[j19]P. T. Krishna Kumar, P. T. Vinod, Vir V. Phoha, S. Sitharama Iyengar, Puneeth Iyengar: Design of a smart biomarker for bioremediation: A machine learning approach. Comp. in Bio. and Med. 41(6): 357-360 (2011)
[j18]Kiran S. Balagani, Vir V. Phoha, Asok Ray, Shashi Phoha: On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters 32(7): 1070-1080 (2011)
[c19]Justin L. Rice, Vir V. Phoha, Pat Cappelaere, Dan Mandl: Web Farm-inspired Computational Cluster in the Cloud. CloudCom 2011: 730-737
[c18]Christian A. Duncan, Vir V. Phoha: On the Complexity of Aggregating Information for Authentication and Profiling. DPM/SETOP 2011: 58-71- 2010
[j17]Kiran S. Balagani, Vir V. Phoha: On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information. IEEE Trans. Pattern Anal. Mach. Intell. 32(7): 1342-1343 (2010)
[j16]Kiran S. Balagani, Vir V. Phoha, S. Sitharama Iyengar, N. Balakrishnan: On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options. IEEE Transactions on Systems, Man, and Cybernetics, Part A 40(3): 651-655 (2010)
[c17]Abdul Serwadda, Vir V. Phoha, Idris A. Rai: Size-based scheduling: a recipe for DDOS? ACM Conference on Computer and Communications Security 2010: 729-731
2000 – 2009
- 2009
[j15]P. T. Krishna Kumar, Vir V. Phoha, S. S. Iyengar, Puneeth Iyengar: Reduction of noise due to systematic uncertainties in 113mIn SPECT imaging using information theory. Comp. in Bio. and Med. 39(5): 482-488 (2009)
[j14]Dimple Juneja, S. Sitharama Iyengar, Vir V. Phoha: Fuzzy Evaluation of Agent-Based Semantic Match-Making Algorithm for Cyberspace. Int. J. Semantic Computing 3(1): 57-76 (2009)
[c16]Gregory Vert, S. S. Iyengar, Vir V. Phoha: Security models for contextual based global processing an architecture and overview. CSIIRW 2009: 53
[c15]Gregory Vert, S. Sitharama Iyengar, Vir V. Phoha: Defining A New Type of Global Information Architecture for Contextual Information Processing. IKE 2009: 214-219
[c14]Vasanth Iyer, S. Sitharama Iyengar, Garimella Rama Murthy, Bertrand Hochet, Vir V. Phoha, M. B. Srinivas: Multi-hop scheduling and local data link aggregation dependant Qos in modeling and simulation of power-aware wireless sensor networks. IWCMC 2009: 844-848
[e1]Sanjay Ranka, Srinivas Aluru, Rajkumar Buyya, Yeh-Ching Chung, Sumeet Dua, Ananth Grama, Sandeep K. S. Gupta, Rajeev Kumar, Vir V. Phoha (Eds.): Contemporary Computing - Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings. Communications in Computer and Information Science 40, Springer 2009, ISBN 978-3-642-03546-3- 2008
[j13]P. T. Krishna Kumar, Vir V. Phoha, S. Sitharama Iyengar: Classification of radio elements using mutual information: A tool for geological mapping. Int. J. Applied Earth Observation and Geoinformation 10(3): 305-311 (2008)- 2007
[j12]Kiran S. Balagani, Vir V. Phoha: On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate. IEEE Trans. Pattern Anal. Mach. Intell. 29(10): 1866-1868 (2007)
[j11]Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani: K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods. IEEE Trans. Knowl. Data Eng. 19(3): 345-354 (2007)
[c13]Shrijit S. Joshi, Vir V. Phoha: Competition between SOM Clusters to Model User Authentication System in Computer Networks. COMSWARE 2007
[c12]
[c11]Yenumula B. Reddy, Vir V. Phoha: Genetic Algorithm Approach for Resource Allocation in Multi-User OFDM Systems. COMSWARE 2007
[c10]Kiran S. Balagani, Vir V. Phoha, Gopi K. Kuchimanchi: A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. ICNSC 2007: 374-379- 2005
[j10]Yong Sheng, Vir V. Phoha, S. M. Rovnyak: A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B 35(4): 826-833 (2005)
[c9]Brenda F. Miles, Vir V. Phoha: The bipartite clique: a topological paradigm for WWWeb user search customization. ACM Southeast Regional Conference (1) 2005: 90-95
[c8]Shrijit S. Joshi, Vir V. Phoha: Investigating hidden Markov models capabilities in anomaly detection. ACM Southeast Regional Conference (1) 2005: 98-103
[c7]Xin Xu, Weihua Song, Vir V. Phoha: Early detection and propagation mitigation of worm programs. ACM Southeast Regional Conference (2) 2005: 193-194- 2004
[j9]Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar: Adaptive Neural Network Clustering of Web Users. IEEE Computer 37(4): 34-40 (2004)
[j8]Vir V. Phoha, Amit U. Nadgar, Asok Ray, Shashi Phoha: Supervisory Control of Software Systems. IEEE Trans. Computers 53(9): 1187-1199 (2004)
[c6]Weihua Song, Vir V. Phoha: Opinion Filtered Recommendation Trust Model in Peer-to-Peer Networks. AP2PC 2004: 237-244
[c5]Weihua Song, Vir V. Phoha, Xin Xu: An Adaptive Recommendation Trust Model in Multiagent System. IAT 2004: 462-465
[c4]Weihua Song, Vir V. Phoha: Neural Network-Based Reputation Model in a Distributed System. CEC 2004: 321-324- 2002
[b1]Vir V. Phoha: Internet security dictionary. Springer 2002, ISBN 978-0-387-95261-1, pp. I-XIX, 1-259
[j7]Vir V. Phoha, S. Sitharama Iyengar, Rajgopal Kannan: Faster Web Page Allocation with Neural Networks. IEEE Internet Computing 6(6): 18-26 (2002)
[c3]Wen Tian, Ben Choi, Vir V. Phoha: An Adaptive Web Cache Access Predictor Using Neural Network. IEA/AIE 2002: 450-459- 2001
[j6]
[c2]Yunjuan Xie, Vir V. Phoha: Web user clustering from access log using belief function. K-CAP 2001: 202-208
[c1]Vir V. Phoha: An interactive dynamic model for integrating knowledge management methods and knowledge sharing technology in a traditional classroom. SIGCSE 2001: 144-148
1990 – 1999
- 1999
[j5]- 1998
[j4]Vir V. Phoha: Review of "Discrete Neural Networks: A Theoretical Foundation by Kai-Yeung Siu, Vwani Roychowdhury and Thomas Kailath", Prentice Hall PTR, 1995, ISBN 0-13-300708-1. SIGART Bulletin 9(2): 29-30 (1998)- 1997
[j3]- 1996
[j2]Vir V. Phoha, William J. B. Oldham: Image recovery and segmentation using competitive learning in a layered network. IEEE Trans. Neural Netw. Learning Syst. 7(4): 843-856 (1996)
[j1]Vir V. Phoha, William J. B. Oldham: Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network. IEEE Trans. Neural Netw. Learning Syst. 7(6): 1547 (1996)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:01 CEST by the dblp team



