Остановите войну!
for scientists:
default search action
Dhruba Kumar Bhattacharyya
Publications
- 2023
- [j84]Manaswita Saikia, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Identification of Potential Biomarkers Using Integrative Approach: A Case Study of ESCC. SN Comput. Sci. 4(2): 114 (2023) - 2022
- [j83]Tulika Kakati, Dhruba K. Bhattacharyya, Jugal K. Kalita, Trina M. Norden-Krichmar:
DEGnext: classification of differentially expressed genes from RNA-seq data using a convolutional neural network with transfer learning. BMC Bioinform. 23(1): 17 (2022) - [j79]Hussain Ahmed Chowdhury, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
UIPBC: An effective clustering for scRNA-seq data analysis without user input. Knowl. Based Syst. 248: 108767 (2022) - 2021
- [j77]Hussain Ahmed Chowdhury, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
UICPC: Centrality-based clustering for scRNA-seq data analysis without user input. Comput. Biol. Medicine 137: 104820 (2021) - [j76]Hussain Ahmed Chowdhury, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
UIFDBC: Effective density based clustering to find clusters of arbitrary shapes without user input. Expert Syst. Appl. 186: 115746 (2021) - [j75]Koyel Mandal, Rosy Sarmah, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita, Bhogeswar Borah:
Rank-preserving biclustering algorithm: a case study on miRNA breast cancer. Medical Biol. Eng. Comput. 59(4): 989-1004 (2021) - [j74]Hussain Ahmed Chowdhury, Pankaj Barah, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
Identification of potential Parkinson's disease biomarkers using computational biology approaches. Netw. Model. Anal. Health Informatics Bioinform. 10(1): 10 (2021) - [c42]Parthajit Borah, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Cost Effective Method for Ransomware Detection: An Ensemble Approach. ICDCIT 2021: 203-219 - 2020
- [j70]Hussain Ahmed Chowdhury, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
Differential Expression Analysis of RNA-seq Reads: Overview, Taxonomy, and Tools. IEEE ACM Trans. Comput. Biol. Bioinform. 17(2): 566-586 (2020) - [j69]Hussain Ahmed Chowdhury, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
(Differential) Co-Expression Analysis of Gene Expression: A Survey of Best Practices. IEEE ACM Trans. Comput. Biol. Bioinform. 17(4): 1154-1173 (2020) - [c41]Pooja Sharma, Anuj K. Pandey, Dhruba K. Bhattacharyya, Jugal K. Kalita, Subhash C. Dutta:
Discovering Biomarkers in Parkinson's Disease Using Module Correspondence and Pathway Information. ICMC 2020: 249-261 - 2019
- [j68]Tulika Kakati, Dhruba K. Bhattacharyya, Pankaj Barah, Jugal K. Kalita:
Comparison of Methods for Differential Co-expression Analysis for Disease Biomarker Prediction. Comput. Biol. Medicine 113 (2019) - [j67]Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
Active learning to detect DDoS attack using ranked features. Comput. Commun. 145: 203-222 (2019) - [j65]Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
Granger Causality in TCP Flooding Attack. Int. J. Netw. Secur. 21(1): 30-39 (2019) - [j64]P. Kakati, D. K. Bhattacharyya, Jugal K. Kalita:
BicBioEC: biclustering in biomarker identification for ESCC. Netw. Model. Anal. Health Informatics Bioinform. 8(1): 19 (2019) - [c40]Tulika Kakati, Dhruba K. Bhattacharyya, Jugal K. Kalita:
DEGnet: Identifying Differentially Expressed Genes Using Deep Neural Network from RNA-Seq Datasets. PReMI (2) 2019: 130-138 - [r1]Swarup Roy, Pooja Sharma, Keshab Nath, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Pre-Processing: A Data Preparation Step. Encyclopedia of Bioinformatics and Computational Biology (1) 2019: 463-471 - 2018
- [j62]Tulika Kakati, Hasin Afzal Ahmed, Dhruba K. Bhattacharyya, Jugal K. Kalita:
THD-Tricluster: A robust triclustering technique and its application in condition specific change analysis in HIV-1 progression data. Comput. Biol. Chem. 75: 154-167 (2018) - [j59]Upasana Sarmah, D. K. Bhattacharyya, Jugal K. Kalita:
A survey of detection methods for XSS attacks. J. Netw. Comput. Appl. 118: 113-143 (2018) - 2017
- [b1]Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-65186-6, pp. 1-257 - [j57]Swaswati Goswami, Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal Kalita:
An Unsupervised Method for Detection of XSS Attack. Int. J. Netw. Secur. 19(5): 761-775 (2017) - [j54]Sajid Nagi, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Complex detection from PPI data using ensemble method. Netw. Model. Anal. Health Informatics Bioinform. 6(1): 3 (2017) - [i6]Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment. CoRR abs/1710.08628 (2017) - 2016
- [j52]Rajib Goswami, Dhruba K. Bhattacharyya, Malayananda Dutta, Jugal K. Kalita:
Approaches and issues in view selection for materialising in data warehouse. Int. J. Bus. Inf. Syst. 21(1): 17-47 (2016) - [j51]Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation. Int. J. Netw. Secur. 18(3): 474-480 (2016) - [j50]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
A multi-step outlier-based anomaly detection approach to network-wide traffic. Inf. Sci. 348: 243-271 (2016) - [j48]Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita:
FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis. Secur. Commun. Networks 9(13): 2032-2041 (2016) - [j47]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric. Secur. Commun. Networks 9(16): 3251-3270 (2016) - [c37]Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita:
A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis. COMSNETS 2016: 1-2 - [c35]Nazrul Hoque, D. K. Bhattacharyya, Jugal K. Kalita:
Denial of Service Attack Detection using Multivariate Correlation Analysis. ICTCS 2016: 100:1-100:6 - [c34]Tulika Kakati, Hasin Afzal Ahmed, Dhruba K. Bhattacharyya, Jugal K. Kalita:
A Fast Gene Expression Analysis using Parallel Biclustering and Distributed Triclustering Approach. ICTCS 2016: 122:1-122:6 - [c32]Kangkan Medhi, Syed Sazzad Ahmed, Swarup Roy, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Information Theoretic Approaches for Detecting Causality in Gene Regulatory Networks. ICTCS 2016: 128:1-128:5 - 2015
- [j44]Hasin Afzal Ahmed, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Core and peripheral connectivity based cluster analysis over PPI network. Comput. Biol. Chem. 59: 32-41 (2015) - [j42]Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Botnet in DDoS Attacks: Trends and Challenges. IEEE Commun. Surv. Tutorials 17(4): 2242-2270 (2015) - [j40]Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Towards Generating Real-life Datasets for Network Intrusion Detection. Int. J. Netw. Secur. 17(6): 683-701 (2015) - [j38]Hasin Afzal Ahmed, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Strew index. Netw. Model. Anal. Health Informatics Bioinform. 4(1): 24 (2015) - [j36]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recognit. Lett. 51: 1-7 (2015) - 2014
- [j35]Swarup Roy, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Reconstruction of gene co-expression network from microarray data using local expression patterns. BMC Bioinform. 15(S-7): S10 (2014) - [j34]Monowar Hussain Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets. Comput. Informatics 33(1): 1-34 (2014) - [j33]Monowar H. Bhuyan, Hirak Jyoti Kashyap, Dhruba Kumar Bhattacharyya, Jugal K. Kalita:
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions. Comput. J. 57(4): 537-556 (2014) - [j32]Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita:
MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method. Comput. J. 57(4): 602-623 (2014) - [j31]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Network Anomaly Detection: Methods, Systems and Tools. IEEE Commun. Surv. Tutorials 16(1): 303-336 (2014) - [j30]Nazrul Hoque, D. K. Bhattacharyya, Jugal K. Kalita:
MIFS-ND: A mutual information-based feature selection method. Expert Syst. Appl. 41(14): 6371-6385 (2014) - [j29]Nazrul Hoque, Monowar H. Bhuyan, Ram Charan Baishya, D. K. Bhattacharyya, Jugal K. Kalita:
Network attacks: Taxonomy, tools and systems. J. Netw. Comput. Appl. 40: 307-324 (2014) - [j25]Hasin Afzal Ahmed, Priyakshi Mahanta, Dhruba Kumar Bhattacharyya, Jugal K. Kalita:
Shifting-and-Scaling Correlation Based Biclustering Algorithm. IEEE ACM Trans. Comput. Biol. Bioinform. 11(6): 1239-1252 (2014) - [c31]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Information metrics for low-rate DDoS attack detection: A comparative evaluation. IC3 2014: 80-84 - 2013
- [j23]Prasanta Gogoi, Dhruba K. Bhattacharyya, Jugal K. Kalita:
A rough set-based effective rule generation method for classification with an application in intrusion detection. Int. J. Secur. Networks 8(2): 61-71 (2013) - [j20]Swarup Roy, Dhruba K. Bhattacharyya, Jugal K. Kalita:
CoBi: Pattern Based Co-Regulated Biclustering of Gene Expression Data. Pattern Recognit. Lett. 34(14): 1669-1678 (2013) - 2012
- [j18]Priyakshi Mahanta, Hasin Afzal Ahmed, Dhruba K. Bhattacharyya, Jugal K. Kalita:
An effective method for network module extraction from microarray data. BMC Bioinform. 13(S-13): S4 (2012) - [j17]G. Priyadarshini, Rosy Das Sarmah, B. Chakraborty, Dhruba Kumar Bhattacharyya, Jugal K. Kalita:
An effective graph-based clustering technique to identify coherent patterns from gene expression data. Int. J. Bioinform. Res. Appl. 8(1/2): 18-37 (2012) - [j16]Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach. Int. J. Netw. Secur. 14(6): 339-351 (2012) - [j15]Hasin Afzal Ahmed, Priyakshi Mahanta, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Module extraction from subspace co-expression networks. Netw. Model. Anal. Health Informatics Bioinform. 1(4): 183-195 (2012) - [c24]Priyakshi Mahanta, Hasin Afzal Ahmed, Jugal K. Kalita, Dhruba Kumar Bhattacharyya:
Discretization in gene expression data analysis: a selected survey. CCSEIT 2012: 69-75 - [c21]Prasanta Gogoi, Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Packet and Flow Based Network Intrusion Dataset. IC3 2012: 322-334 - [c19]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
An effective unsupervised network anomaly detection method. ICACCI 2012: 533-539 - [c18]Swarup Roy, D. K. Bhattacharyya, Jugal K. Kalita:
Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data. KES 2012: 490-499 - [i4]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Survey on Incremental Approaches for Network Anomaly Detection. CoRR abs/1211.4493 (2012) - 2011
- [j13]Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita:
A Survey of Outlier Detection Methods in Network Anomaly Identification. Comput. J. 54(4): 570-588 (2011) - [j12]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
Surveying Port Scans and Their Detection Methodologies. Comput. J. 54(10): 1565-1581 (2011) - [j11]Monowar Hussain Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Survey on Incremental Approaches for Network Anomaly Detection. Int. J. Commun. Networks Inf. Secur. 3(3) (2011) - [j9]Rosy Das, Jugal K. Kalita, Dhruba Kumar Bhattacharyya:
A pattern matching approach for clustering gene expression data. Int. J. Data Min. Model. Manag. 3(2): 130-149 (2011) - [c15]Hasin Afzal Ahmed, Priyakshi Mahanta, D. K. Bhattacharyya, Jugal K. Kalita:
GERC: Tree Based Clustering for Gene Expression Data. BIBE 2011: 299-302 - [c13]Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
NADO: network anomaly detection using outlier approach. ICCCS 2011: 531-536 - 2009
- [j6]Rosy Das, Jugal K. Kalita, Dhruba Kumar Bhattacharyya:
A new approach for clustering gene expression time series data. Int. J. Bioinform. Res. Appl. 5(3): 310-328 (2009) - [c9]Rosy Das, Dhruba Kumar Bhattacharyya, Jugal K. Kalita:
An Incremental Clustering of Gene Expression Data. NaBIC 2009: 742-747 - 2006
- [c6]Pranab Jyoti Dutta, D. K. Bhattacharyya, Jugal K. Kalita, Malayananda Dutta:
Clustering Approach to Content Based Image Retrieval. GMAI 2006: 183-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint