Remote patient monitoring: a comprehensive study LP Malasinghe, N Ramzan, K Dahal Journal of Ambient Intelligence and Humanized Computing 10, 57-76, 2019 | 347 | 2019 |
Intelligent phishing detection system for e-banking using fuzzy data mining M Aburrous, MA Hossain, K Dahal, F Thabtah Expert systems with applications 37 (12), 7913-7921, 2010 | 257 | 2010 |
An adaptive ensemble classifier for mining concept drifting data streams DM Farid, L Zhang, A Hossain, CM Rahman, R Strachan, G Sexton, ... Expert Systems with Applications 40 (15), 5895-5906, 2013 | 190 | 2013 |
Recommendation based trust model with an effective defence scheme for MANETs AM Shabut, KP Dahal, SK Bista, IU Awan IEEE Transactions on mobile computing 14 (10), 2101-2115, 2014 | 173 | 2014 |
Generator maintenance scheduling in power systems using metaheuristic-based hybrid approaches KP Dahal, N Chakpitak Electric power systems research 77 (7), 771-779, 2007 | 167 | 2007 |
Portfolio optimization using multi-obj ective genetic algorithms P Skolpadungket, K Dahal, N Harnpornchai 2007 IEEE Congress on Evolutionary Computation, 516-523, 2007 | 143 | 2007 |
Predicting phishing websites using classification mining techniques with experimental case studies M Aburrous, MA Hossain, K Dahal, F Thabtah 2010 seventh international conference on information technology: New …, 2010 | 142 | 2010 |
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN RMA Ujjan, Z Pervez, K Dahal, AK Bashir, R Mumtaz, J González Future Generation Computer Systems 111, 763-779, 2020 | 120 | 2020 |
Generator maintenance scheduling using a genetic algorithm with a fuzzy evaluation function KP Dahal, CJ Aldridge, JR McDonald Fuzzy Sets and Systems 102 (1), 21-29, 1999 | 95 | 1999 |
An efficient feature selection based Bayesian and Rough set approach for intrusion detection M Prasad, S Tripathi, K Dahal Applied Soft Computing 87, 105980, 2020 | 93 | 2020 |
Experimental case studies for investigating e-banking phishing techniques and attack strategies M Aburrous, MA Hossain, K Dahal, F Thabtah Cognitive Computation 2, 242-253, 2010 | 93 | 2010 |
Tuning struggle strategy in genetic algorithms for scheduling in computational grids F Xhafa, B Duran, A Abraham, KP Dahal 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 91 | 2008 |
Intelligent phishing website detection system using fuzzy techniques M Aburrous, MA Hossain, F Thabatah, K Dahal 2008 3rd International Conference on Information and Communication …, 2008 | 77 | 2008 |
Generator maintenance scheduling of electric power systems using genetic algorithms with integer representation KP Dahal, JR McDonald IET Digital Library, 1997 | 76 | 1997 |
DNS-IdM: A blockchain identity management system to secure personal data sharing in a network J Alsayed Kassem, S Sayeed, H Marco-Gisbert, Z Pervez, K Dahal Applied Sciences 9 (15), 2953, 2019 | 75 | 2019 |
Internet of Things (IoT) a survey on architecture, enabling technologies, applications and challenges A Giri, S Dutta, S Neogy, K Dahal, Z Pervez Proceedings of the 1st international conference on internet of things and …, 2017 | 69 | 2017 |
A GA (TS) hybrid algorithm for scheduling in computational grids F Xhafa, JA Gonzalez, KP Dahal, A Abraham Hybrid Artificial Intelligence Systems: 4th International Conference, HAIS …, 2009 | 69 | 2009 |
Test data generation from UML state machine diagrams using gas C Doungsa-ard, K Dahal, A Hossain, T Suwannasart International Conference on Software Engineering Advances (ICSEA 2007), 47-47, 2007 | 68 | 2007 |
Intelligent learning algorithms for active vibration control A Madkour, MA Hossain, KP Dahal, H Yu IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007 | 63 | 2007 |
A port system simulation facility with an optimization capability K Dahal, S Galloway, G Burt, J Mcdonald, I Hopkins International Journal of Computational Intelligence and Applications 3 (04 …, 2003 | 54 | 2003 |