137(top 1%)
papers
2.3K(top 1%)
citations
25(top 1%)
h-index
44(top 1%)
g-index
319
all documents
3.7K
doc citations
626
citing journals

Top Articles

#TitleJournalYearCitations
1A comparison of static, dynamic, and hybrid analysis for malware detectionJournal of Computer Virology and Hacking Techniques2017270
2Hunting for metamorphic enginesJournal in Computer Virology2006195
3Opcode graph similarity and metamorphic detectionJournal in Computer Virology2012128
4Structural entropy and metamorphic malwareJournal of Computer Virology and Hacking Techniques2013105
5Hunting for undetectable metamorphic virusesJournal in Computer Virology201198
6Prediction of Indian election using sentiment analysis on Hindi Twitter201687
7Profile hidden Markov models and metamorphic virus detectionJournal in Computer Virology200981
8Hidden Markov models for malware classificationJournal of Computer Virology and Hacking Techniques201578
9Granular Computing: Practices, Theories, and Future Directions200972
10Deriving common malware behavior through graph clusteringComputers and Security201369
11Chi-squared distance and metamorphic virus detectionJournal of Computer Virology and Hacking Techniques201368
12Metamorphic worm that carries its own morphing engineJournal of Computer Virology and Hacking Techniques201357
13Granular Computing200356
14Simple substitution distance and metamorphic detectionJournal of Computer Virology and Hacking Techniques201353
15Detecting malware evolution using support vector machinesExpert Systems With Applications202052
16Granular computing I: the concept of granulation and its formal modelInternational Journal of Granular Computing, Rough Sets and Intelligent Systems200946
17Movie Recommendation System Using Collaborative Filtering201846
18Dynamic Virtual Machine migration algorithms using enhanced energy consumption model for green cloud data centers201441
19Comparison of in situ aerosol extinction and scattering coefficient measurements made during the Aerosol Intensive Operating PeriodJournal of Geophysical Research200639
20Detecting Web Attacks Using Multi-stage Log Analysis201639
21Convolutional neural networks and extreme learning machines for malware classificationJournal of Computer Virology and Hacking Techniques202039
22C. elegans avoids toxin-producing Streptomyces using a seven transmembrane domain chemosensory receptorELife201738
23Granular computing: examples, intuitions and modeling200537
24Clustering for malware classificationJournal of Computer Virology and Hacking Techniques201737
25Image spam analysis and detectionJournal of Computer Virology and Hacking Techniques201837
26Improving text classification with word embedding201734
27On data aggregation quality and energy efficiency of wireless sensor network protocols - extended summary033
28Eigenvalue analysis for metamorphic detectionJournal of Computer Virology and Hacking Techniques201433
29DBSCAN on Resilient Distributed Datasets201533
30Sinkhole intrusion indicators in DSR MANETs032
31Foreword to the Special Section on Granular ComputingIEEE Transactions on Fuzzy Systems200832
32Support vector machines and malware detectionJournal of Computer Virology and Hacking Techniques201632
33Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems201832
34Efficient Monitoring and Contact Tracing for COVID-19: A Smart IoT-Based FrameworkIEEE Internet of Things Magazine202032
35Load balancing in 5G cloud radio access networks supporting IoT communications for smart communities201730
36The extracellular contractile injection system is enriched in environmental microbes and associates with numerous toxinsNature Communications202130
37A Roadmap from Rough Set Theory to Granular ComputingLecture Notes in Computer Science200630
38Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data Centers201628
39Masquerade detection using profile hidden Markov modelsComputers and Security201127
40MICO: an open source CORBA implementationIEEE Software200426
41Face Recognition Based on Local Binary Patterns with Threshold201026
42Joint route-server load balancing in software defined networks using ant colony optimization201626
43Special issue on granular computing and data miningInternational Journal of Intelligent Systems200425
44Joint Computation Offloading and Prioritized Scheduling in Mobile Edge Computing201825
45Recommender System for Improving Customer LoyaltyStudies in Big Data202024
46A fast association rule algorithm based on bitmap and granular computing023
47Modular neural networks with applications to pattern profiling problemsNeurocomputing200923
48Twitter opinion mining for adverse drug reactions201522
49Location and Mobility Aware Resource Management for 5G Cloud Radio Access Networks201722
50Dueling hidden Markov models for virus analysisJournal of Computer Virology and Hacking Techniques201521