33(top 100%)
papers
1.3K(top 20%)
citations
20(top 100%)
h-index
37(top 100%)
g-index
51
all documents
1.6K
doc citations
329
citing journals
100
times ranked

Publications

47 papers • 1,622 citations • Sorted by year • Download PDF (PDF by citations)
Sort: Year | Citations
#ArticleIFCitationsLinks
1STORM: A MapReduce Framework for Symbolic Time Intervals Series Classification4.30Citations (PDF)
2Multivariate temporal data analysis ‐ a review11.410Citations (PDF)
3All-cause mortality prediction in T2D patients with iTirps7.31Citations (PDF)
4Pkg2Vec: Hierarchical package embedding for code authorship attribution7.913Citations (PDF)
5Temporal pattern-based malicious activity detection in SCADA systems
Computers and Security, 2021, 102, 102153
6.814Citations (PDF)
6Outcomes prediction in longitudinal data: Study designs evaluation, use case in ICU acquired sepsis4.814Citations (PDF)
7THAAD: Efficient matching queries under temporal abstraction for anomaly detection
Performance Evaluation, 2021, 149-150, 102219
1.12Citations (PDF)
8Decompiled APK based malicious code classification7.918Citations (PDF)
9All-Cause Mortality Prediction in T2D Patients0.03Citations (PDF)
10Acute Hypertensive Episodes Prediction0.04Citations (PDF)
11Falls Prediction in Care Homes Using Mobile App Data Collection0.05Citations (PDF)
12Temporal biomedical data analytics4.86Citations (PDF)
13Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods7.314Citations (PDF)
14Consistent discovery of frequent interval-based temporal patterns in chronic patients’ data4.828Citations (PDF)
15<i>JASIST</i> special issue on biomedical information retrieval4.23Citations (PDF)
16Procedure prediction from symbolic Electronic Health Records via time intervals analytics4.826Citations (PDF)
17Prognosis of Clinical Outcomes with Temporal Patterns and Experiences with One Class Feature Selection3.723Citations (PDF)
18Systems biology approaches for identifying adverse drug reactions and elucidating their underlying biological mechanisms8.238Citations (PDF)
19Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework1.330Citations (PDF)
20Temporal data analytics4.80Citations (PDF)
21Improving condition severity classification with an efficient active learning based framework4.820Citations (PDF)
22ALDROID: efficient update of Android anti-virus software using designated active learning methods3.627Citations (PDF)
23Outcomes Prediction via Time Intervals Related Patterns
2015, 25, 919-924
19Citations (PDF)
24An Active Learning Framework for Efficient Condition Severity Classification0.06Citations (PDF)
25ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files
2014, , 91-98
27Citations (PDF)
26Novel active learning methods for enhanced PC malware detection in windows OS8.892Citations (PDF)
27Classification-driven temporal discretization of multivariate time series4.284Citations (PDF)
28Classification of multivariate time series via temporal abstraction and time intervals mining3.684Citations (PDF)
29Fast time intervals mining using the transitivity of temporal relations3.682Citations (PDF)
30Detecting unknown computer worm activity via support vector machines and active learning2.254Citations (PDF)
31User identity verification via mouse dynamics
Information Sciences, 2012, 201, 19-36
7.3114Citations (PDF)
32Detecting unknown malicious code by applying classification techniques on OpCode patterns1.3198Citations (PDF)
33Clustering di-graphs for continuously verifying users according to their typing patterns
2010, ,
21Citations (PDF)
34Continuous Verification Using Keystroke Dynamics
2010, , 411-415
40Citations (PDF)
35Vaidurya: A multiple-ontology, concept-based, context-sensitive clinical-guideline search engine4.825Citations (PDF)
36Using artificial neural networks to detect unknown computer worms5.015Citations (PDF)
37Unknown malcode detection and the imbalance problem3.260Citations (PDF)
38Malicious Code Detection Using Active Learning0.029Citations (PDF)
39Detection of unknown computer worms based on behavioral classification of the host1.588Citations (PDF)
40Optimization of Fire blight scouting with a decision support system based on infection risk8.76Citations (PDF)
41Unknown malcode detection via text categorization and the imbalance problem
2008, ,
74Citations (PDF)
42Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
2007, ,
10Citations (PDF)
43Malicious Code Detection and Acquisition Using Active Learning
2007, ,
15Citations (PDF)
44A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search4.126Citations (PDF)
45Multiple hierarchical classification of free-text clinical guidelines7.325Citations (PDF)
46A framework for a distributed, hybrid, multiple-ontology clinical-guideline library, and automated guideline-support tools4.880Citations (PDF)
47Improving the Detection of Unknown Computer Worms Activity Using Active Learning0.014Citations (PDF)