Follow
Keshav Dahal
Keshav Dahal
Professor in Intelligent Systems at the University of the West of Scotland
Verified email at uws.ac.uk
Title
Cited by
Cited by
Year
Remote patient monitoring: a comprehensive study
LP Malasinghe, N Ramzan, K Dahal
Journal of Ambient Intelligence and Humanized Computing 10, 57-76, 2019
3472019
Intelligent phishing detection system for e-banking using fuzzy data mining
M Aburrous, MA Hossain, K Dahal, F Thabtah
Expert systems with applications 37 (12), 7913-7921, 2010
2572010
An adaptive ensemble classifier for mining concept drifting data streams
DM Farid, L Zhang, A Hossain, CM Rahman, R Strachan, G Sexton, ...
Expert Systems with Applications 40 (15), 5895-5906, 2013
1902013
Recommendation based trust model with an effective defence scheme for MANETs
AM Shabut, KP Dahal, SK Bista, IU Awan
IEEE Transactions on mobile computing 14 (10), 2101-2115, 2014
1732014
Generator maintenance scheduling in power systems using metaheuristic-based hybrid approaches
KP Dahal, N Chakpitak
Electric power systems research 77 (7), 771-779, 2007
1672007
Portfolio optimization using multi-obj ective genetic algorithms
P Skolpadungket, K Dahal, N Harnpornchai
2007 IEEE Congress on Evolutionary Computation, 516-523, 2007
1432007
Predicting phishing websites using classification mining techniques with experimental case studies
M Aburrous, MA Hossain, K Dahal, F Thabtah
2010 seventh international conference on information technology: New …, 2010
1422010
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN
RMA Ujjan, Z Pervez, K Dahal, AK Bashir, R Mumtaz, J González
Future Generation Computer Systems 111, 763-779, 2020
1202020
Generator maintenance scheduling using a genetic algorithm with a fuzzy evaluation function
KP Dahal, CJ Aldridge, JR McDonald
Fuzzy Sets and Systems 102 (1), 21-29, 1999
951999
An efficient feature selection based Bayesian and Rough set approach for intrusion detection
M Prasad, S Tripathi, K Dahal
Applied Soft Computing 87, 105980, 2020
932020
Experimental case studies for investigating e-banking phishing techniques and attack strategies
M Aburrous, MA Hossain, K Dahal, F Thabtah
Cognitive Computation 2, 242-253, 2010
932010
Tuning struggle strategy in genetic algorithms for scheduling in computational grids
F Xhafa, B Duran, A Abraham, KP Dahal
2008 7th Computer Information Systems and Industrial Management Applications …, 2008
912008
Intelligent phishing website detection system using fuzzy techniques
M Aburrous, MA Hossain, F Thabatah, K Dahal
2008 3rd International Conference on Information and Communication …, 2008
772008
Generator maintenance scheduling of electric power systems using genetic algorithms with integer representation
KP Dahal, JR McDonald
IET Digital Library, 1997
761997
DNS-IdM: A blockchain identity management system to secure personal data sharing in a network
J Alsayed Kassem, S Sayeed, H Marco-Gisbert, Z Pervez, K Dahal
Applied Sciences 9 (15), 2953, 2019
752019
Internet of Things (IoT) a survey on architecture, enabling technologies, applications and challenges
A Giri, S Dutta, S Neogy, K Dahal, Z Pervez
Proceedings of the 1st international conference on internet of things and …, 2017
692017
A GA (TS) hybrid algorithm for scheduling in computational grids
F Xhafa, JA Gonzalez, KP Dahal, A Abraham
Hybrid Artificial Intelligence Systems: 4th International Conference, HAIS …, 2009
692009
Test data generation from UML state machine diagrams using gas
C Doungsa-ard, K Dahal, A Hossain, T Suwannasart
International Conference on Software Engineering Advances (ICSEA 2007), 47-47, 2007
682007
Intelligent learning algorithms for active vibration control
A Madkour, MA Hossain, KP Dahal, H Yu
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007
632007
A port system simulation facility with an optimization capability
K Dahal, S Galloway, G Burt, J Mcdonald, I Hopkins
International Journal of Computational Intelligence and Applications 3 (04 …, 2003
542003
The system can't perform the operation now. Try again later.
Articles 1–20