Остановите войну!
for scientists:
default search action
Sikha Bagui
- > Home > Persons > Sikha Bagui
Publications
- 2023
- [j37]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Sakthivel Subramaniam:
Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data. Comput. 12(10): 204 (2023) - [j36]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Tirthankar Ghosh, Russell Plenkers, Tom McElroy, Stephan Dulaney, Sajida Shabanali:
Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework. Data 8(1): 18 (2023) - [j35]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Sakthivel Subramaniam, Daniel Wallace:
Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks. Future Internet 15(4): 130 (2023) - [j34]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Michael Plain, Jadarius Hill, Marshall Elam:
Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22. Future Internet 15(7): 236 (2023) - [j33]Tirthankar Ghosh, Sikha Bagui, Subhash C. Bagui, Martin Kadzis, Jackson Bare:
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis. J. Cybersecur. Priv. 3(4): 895-913 (2023) - 2022
- [j29]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Tirthankar Ghosh, Tom McElroy, Esteban Paredes, Nithisha Khasnavis, Russell Plenkers:
Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark's Machine Learning in the Big Data Framework. Sensors 22(20): 7999 (2022) - 2021
- [j28]Dustin Mink, Jeffrey Todd McDonald, Sikha Bagui, William Bradley Glisson, Jordan Shropshire, Ryan Benton, Samuel H. Russ:
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B. Big Data Cogn. Comput. 5(2): 27 (2021) - [j27]Sikha Bagui, Jason Simonds, Russell Plenkers, Timothy A. Bennett, Subhash C. Bagui:
Classifying UNSW-NB15 Network Traffic in the Big Data Framework Using Random Forest in Spark. Int. J. Big Data Intell. Appl. 2(1): 39-61 (2021) - [j26]Sikha Bagui, Keenal M. Shah, Yizhi Hu, Subhash C. Bagui:
Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm. Int. J. Inf. Secur. Priv. 15(1): 26-43 (2021) - 2020
- [j24]Sikha Bagui, Keerthi Devulapalli, John Coffey:
A heuristic approach for load balancing the FP-growth algorithm on MapReduce. Array 7: 100035 (2020) - [j22]Sikha Bagui, Keerthi Devulapalli, Sharon K. John:
MapReduce Implementation of a Multinomial and Mixed Naive Bayes Classifier. Int. J. Intell. Inf. Technol. 16(2): 1-23 (2020) - 2019
- [j20]Amitabh Mishra, Sikha Bagui, John Compo:
Design and Testing of a Real-Time Audio-Quality Feedback System for Weather Broadcasts and a Framework for a Weather Broadcast Transmission Technology Switch. IEEE Access 7: 158782-158797 (2019) - [j19]Sikha Bagui, Arup Kumar Mondal, Subhash C. Bagui:
Improving the Performance of kNN in the MapReduce Framework Using Locality Sensitive Hashing. Int. J. Distributed Syst. Technol. 10(4): 1-16 (2019) - [j17]Sikha Bagui, Ezhil Kalaimannan, Subhash C. Bagui, Debarghya Nandi, Anthony Pinto:
Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Secur. Priv. 2(6) (2019) - [c13]Sikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White:
Classifying Phishing Email Using Machine Learning and Deep Learning. Cyber Security 2019: 1-2 - 2018
- [j16]Sikha Bagui, Keerthi Devulapalli:
Comparison of Hive's query optimisation techniques. Int. J. Big Data Intell. 5(4): 243-257 (2018) - [c12]Sikha Bagui, Arup Kumar Mondal, Subhash C. Bagui:
Using locality sensitive hashing to improve the KNN algorithm in the mapreduce framework. ACM Southeast Regional Conference 2018: 32:1 - [c10]Sikha Bagui, Debarghya Nandi, Subhash C. Bagui:
A hybrid genetic algorithm for network intrusion detection. ACM Southeast Regional Conference 2018: 34:1 - [c9]Sikha Bagui, Sharon K. John, John P. Baggs:
A comparative study of mapreduce and hive based on the design of the information gain algorithm for analytical workloads. ACM Southeast Regional Conference 2018: 37:1 - [c8]Sikha Bagui, Sharon K. John, John P. Baggs, Subhash C. Bagui:
A Parallel Implementation of Information Gain Using Hive in Conjunction with MapReduce for Continuous Features. PAKDD (Workshops) 2018: 283-294 - 2017
- [j15]Xingang Fang, Sikha Bagui, Subhash C. Bagui:
Improving virtual screening predictive accuracy of Human kallikrein 5 inhibitors using machine learning models. Comput. Biol. Chem. 69: 110-119 (2017) - 2014
- [c7]Alfred Zimmermann, Bilal Gonen, Rainer Schmidt, Eman El-Sheikh, Sikha Bagui, Norman Wilde:
Adaptable Enterprise Architectures for Software Evolution of SmartLife Ecosystems. EDOC Workshops 2014: 316-323 - [c6]Bilal Gonen, Xingang Fang, Eman El-Sheikh, Sikha Bagui, Norman Wilde, Alfred Zimmermann, Ilia Petrov:
Maintaining SOA Systems of the Future - How Can Ontological Modeling Help?. KEOD 2014: 376-381 - 2011
- [j11]Sikha Bagui, Mohammad Islam, Subhash C. Bagui:
An Architecture for Query Optimization Using Association Rule Mining. Int. J. Knowl. Based Organ. 1(4): 32-55 (2011) - 2010
- [j10]Sikha Bagui, Jiri Just, Subhash C. Bagui, Rohan Hemasinha:
Using a cosine-type measure to derive strong association mining rules. Int. J. Knowl. Eng. Data Min. 1(1): 69-83 (2010) - [c5]Sikha Bagui, Mohammad Islam:
Query optimization in large databases using association rule mining. ACM Southeast Regional Conference 2010: 85 - 2009
- [j9]Sikha Bagui, Jiri Just, Subhash C. Bagui:
Deriving strong association mining rules using a dependency criterion, the lift measure. Int. J. Data Anal. Tech. Strateg. 1(3): 297-312 (2009) - [c4]Lakshmi Prayaga, Laura J. White, Sikha Bagui:
Innovative Strategies to Build IT Workforce. CSEE&T 2009: 202-209 - 2007
- [j6]Sikha Bagui, Dustin Mink, Patrick Cash:
Data mining techniques to study voting patterns in the US. Data Sci. J. 6: 46-63 (2007) - 2003
- [j1]Subhash C. Bagui, Sikha Bagui, Kuhu Pal, Nikhil R. Pal:
Breast cancer detection using rank nearest neighbor classification rules. Pattern Recognit. 36(1): 25-34 (2003)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-02 22:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint