A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection S Revathi, A Malathi International Journal of Engineering Research & Technology (IJERT) 2 (12 …, 2013 | 596 | 2013 |
A survey on churn prediction techniques in communication sector N Kamalraj, A Malathi International Journal of Computer Applications 64 (5), 39-42, 2013 | 56 | 2013 |
Evolving data mining algorithms on the prevailing crime trend–an intelligent crime prediction model A Malathi, SS Baboo Int J Sci Eng Res 2 (6), 2011 | 32 | 2011 |
Algorithmic crime prediction model based on the analysis of crime clusters A Malathi, DSS Baboo Global Journal of Computer Science and Technology 11 (11), 47-51, 2011 | 29 | 2011 |
Applying data mining techniques in telecom churn prediction N Kamalraj, A Malathi International Journal of Advanced Research in Computer Science and Software …, 2013 | 22 | 2013 |
Fuzzy logic system for risk-level classification of diabetic nephropathy B Narasimhan, A Malathi 2014 International Conference on Green Computing Communication and …, 2014 | 19 | 2014 |
Exploring on various prediction model in data mining techniques for disease Diagnosis K Lokanayaki, A Malathi International Journal of Computer Applications 77 (5), 2013 | 19 | 2013 |
Network Intrusion Detection Based On Fuzzy Logic S Revathi, A Malathi International Journal of Computer Application 1 (4), 143-149, 2014 | 17 | 2014 |
Data preprocessing for intrusion detection system using swarm intelligence techniques S Revathi, A Malathi International Journal of Computer Applications 75 (6), 2013 | 17 | 2013 |
Survey on software testing techniques in cloud computing V Priyadharshini, A Malathi CoRR, abs/1402.1925, 2014 | 15 | 2014 |
Enhanced algorithms to identify change in crime patterns A Malathi, SS Baboo International Journal of Combinatorial Optimization Problems and Informatics …, 2011 | 15 | 2011 |
A fuzzy logic system with attribute ranking technique for risk-level classification of CAHD in female diabetic patients B Narasimhan, A Malathi 2014 International Conference on Intelligent Computing Applications, 179-183, 2014 | 14 | 2014 |
A detailed analysis of KDD cup99 Dataset for IDS S Revathi, A Malathi Int. J. Eng. Res. Technol.(IJERT) 2, 12, 2013 | 13 | 2013 |
Investigation of data mining techniques in fraud detection: credit card R Gayathri, A Malathi International journal of computer applications 82 (9), 2013 | 13 | 2013 |
Hybrid fuzzy adaptive Wiener filtering with optimization for intrusion detection R Sujendran, M Arunachalam ETRI Journal 37 (3), 502-511, 2015 | 12 | 2015 |
Detecting user-to-root (U2R) attacks based on various machine learning techniques S Revathi, A Malathi Int. J. Adv. Res. Comput. Commun. Eng 3 (4), 6322-6324, 2014 | 12 | 2014 |
Preprocessing of various data sets using different classification algorithms for evolutionary programming R Karthick, DA Malathi International Journal of Science and Research (IJSR) 4 (4), 2730-33, 2015 | 11 | 2015 |
Detecting denial of service attack using principal component analysis with random forest classifier S Revathi, A Malathi International Journal of Computer Science & Engineering Technology (IJCSET …, 2014 | 11 | 2014 |
Network intrusion detection using hybrid simplified swarm optimization and random forest algorithm on Nsl-Kdd dataset S Revathi, A Malathi International Journal of Engineering and Computer Science 3 (3873-3876), 2014 | 11 | 2014 |
Improved fuzzy artificial neural network (IFANN) classifier for coronary artery heart disease prediction in diabetes patients B Narasimhan, A Malathi Indian Journal of Applied Research 9 (04), 2019 | 9 | 2019 |