About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
Department of Computer Science
›
top-articles
Department of Computer Science
137
(top 1%)
papers
2.3K
(top 1%)
citations
25
(top 1%)
h
-index
44
(top 1%)
g
-index
319
all documents
3.7K
doc citations
626
citing journals
Top Articles
#
Title
Journal
Year
Citations
1
A comparison of static, dynamic, and hybrid analysis for malware detection
Journal of Computer Virology and Hacking Techniques
2017
270
2
Hunting for metamorphic engines
Journal in Computer Virology
2006
195
3
Opcode graph similarity and metamorphic detection
Journal in Computer Virology
2012
128
4
Structural entropy and metamorphic malware
Journal of Computer Virology and Hacking Techniques
2013
105
5
Hunting for undetectable metamorphic viruses
Journal in Computer Virology
2011
98
6
Prediction of Indian election using sentiment analysis on Hindi Twitter
2016
87
7
Profile hidden Markov models and metamorphic virus detection
Journal in Computer Virology
2009
81
8
Hidden Markov models for malware classification
Journal of Computer Virology and Hacking Techniques
2015
78
9
Granular Computing: Practices, Theories, and Future Directions
2009
72
10
Deriving common malware behavior through graph clustering
Computers and Security
2013
69
11
Chi-squared distance and metamorphic virus detection
Journal of Computer Virology and Hacking Techniques
2013
68
12
Metamorphic worm that carries its own morphing engine
Journal of Computer Virology and Hacking Techniques
2013
57
13
Granular Computing
2003
56
14
Simple substitution distance and metamorphic detection
Journal of Computer Virology and Hacking Techniques
2013
53
15
Detecting malware evolution using support vector machines
Expert Systems With Applications
2020
52
16
Granular computing I: the concept of granulation and its formal model
International Journal of Granular Computing, Rough Sets and Intelligent Systems
2009
46
17
Movie Recommendation System Using Collaborative Filtering
2018
46
18
Dynamic Virtual Machine migration algorithms using enhanced energy consumption model for green cloud data centers
2014
41
19
Comparison of in situ aerosol extinction and scattering coefficient measurements made during the Aerosol Intensive Operating Period
Journal of Geophysical Research
2006
39
20
Detecting Web Attacks Using Multi-stage Log Analysis
2016
39
21
Convolutional neural networks and extreme learning machines for malware classification
Journal of Computer Virology and Hacking Techniques
2020
39
22
C. elegans avoids toxin-producing Streptomyces using a seven transmembrane domain chemosensory receptor
ELife
2017
38
23
Granular computing: examples, intuitions and modeling
2005
37
24
Clustering for malware classification
Journal of Computer Virology and Hacking Techniques
2017
37
25
Image spam analysis and detection
Journal of Computer Virology and Hacking Techniques
2018
37
26
Improving text classification with word embedding
2017
34
27
On data aggregation quality and energy efficiency of wireless sensor network protocols - extended summary
0
33
28
Eigenvalue analysis for metamorphic detection
Journal of Computer Virology and Hacking Techniques
2014
33
29
DBSCAN on Resilient Distributed Datasets
2015
33
30
Sinkhole intrusion indicators in DSR MANETs
0
32
31
Foreword to the Special Section on Granular Computing
IEEE Transactions on Fuzzy Systems
2008
32
32
Support vector machines and malware detection
Journal of Computer Virology and Hacking Techniques
2016
32
33
Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems
2018
32
34
Efficient Monitoring and Contact Tracing for COVID-19: A Smart IoT-Based Framework
IEEE Internet of Things Magazine
2020
32
35
Load balancing in 5G cloud radio access networks supporting IoT communications for smart communities
2017
30
36
The extracellular contractile injection system is enriched in environmental microbes and associates with numerous toxins
Nature Communications
2021
30
37
A Roadmap from Rough Set Theory to Granular Computing
Lecture Notes in Computer Science
2006
30
38
Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data Centers
2016
28
39
Masquerade detection using profile hidden Markov models
Computers and Security
2011
27
40
MICO: an open source CORBA implementation
IEEE Software
2004
26
41
Face Recognition Based on Local Binary Patterns with Threshold
2010
26
42
Joint route-server load balancing in software defined networks using ant colony optimization
2016
26
43
Special issue on granular computing and data mining
International Journal of Intelligent Systems
2004
25
44
Joint Computation Offloading and Prioritized Scheduling in Mobile Edge Computing
2018
25
45
Recommender System for Improving Customer Loyalty
Studies in Big Data
2020
24
46
A fast association rule algorithm based on bitmap and granular computing
0
23
47
Modular neural networks with applications to pattern profiling problems
Neurocomputing
2009
23
48
Twitter opinion mining for adverse drug reactions
2015
22
49
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Networks
2017
22
50
Dueling hidden Markov models for virus analysis
Journal of Computer Virology and Hacking Techniques
2015
21
site/software ©
exaly
; All materials licenced under
CC by-SA
.