A review of fraud detection techniques: Credit card K Chaudhary, J Yadav, B Mallick International Journal of Computer Applications 45 (1), 39-44, 2012 | 158 | 2012 |
A study of time series models ARIMA and ETS G Jain, B Mallick Available at SSRN 2898968, 2017 | 122 | 2017 |
Load balancing in cloud computing using dynamic load management algorithm R Panwar, B Mallick 2015 International Conference on Green Computing and Internet of Things …, 2015 | 103 | 2015 |
A comparative study of load balancing algorithms in cloud computing R Panwar, B Mallick International Journal of Computer Applications 117 (24), 2015 | 41 | 2015 |
Deep learning-based sequential pattern mining for progressive database A Jamshed, B Mallick, P Kumar Soft Computing 24 (22), 17233-17246, 2020 | 30 | 2020 |
Impact of gray hole attack in VANET S Verma, B Mallick, P Verma 2015 1st International conference on next generation computing technologies …, 2015 | 27 | 2015 |
A reliable tactic for detecting black hole attack in vehicular ad hoc networks I Dhyani, N Goel, G Sharma, B Mallick Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016 …, 2017 | 25 | 2017 |
Comparative performance analysis of MANET routing protocols in military operation using NS2 S Katiyar, R Gujral, B Mallick 2015 international conference on green computing and internet of things …, 2015 | 20 | 2015 |
Incremental mining of sequential patterns: Progress and challenges B Mallick, D Garg, PS Grover Intelligent Data Analysis 17 (3), 507-530, 2013 | 20 | 2013 |
Credit Card Fraud: The study of its impact and detection techniques K Chaudhary, B Mallick International Journal of Computer Science and Network (IJCSN) 1 (4), 31-35, 2012 | 16 | 2012 |
Exploration of Data mining techniques in fraud detection: credit card K Chaudhary, B Mallick International Journal of Electronics and Computer Science Engineering 1 (3 …, 2012 | 16 | 2012 |
Performance evaluation of MAC protocol for IEEE 802.11, 802.11 ext. WLAN and IEEE 802.15. 4 WPAN using ns-2 D Bhaskar, B Mallick International Journal of Computer Applications 119 (16), 25-30, 2015 | 15 | 2015 |
Constraint-based sequential pattern mining: a pattern growth algorithm incorporating compactness, length and monetary. B Mallick, D Garg, PS Grover Int. Arab J. Inf. Technol. 11 (1), 33-42, 2014 | 14 | 2014 |
A review on weather forecasting techniques G Jain, B Mallick International Journal of Advanced Research in Computer and Communication …, 2016 | 13 | 2016 |
Customer Purchasing Behavior using Sequential Pattern Mining Technique A Goel, B Mallick International Journal of Computer Applications 119 (1), 24 - 31, 2015 | 10 | 2015 |
A study on the use of non-parametric tests for experimentation with cluster analysis D Singh, B Mallick International Journal of Innovative Technology and Exploring Engineering 3 (4), 2013 | 10 | 2013 |
SVM and naïve bayes network traffic classification using correlation information D Tiwari, B Mallick International Journal of Computer Applications 147 (3), 2016 | 9 | 2016 |
CFM-PrefixSpan: A pattern growth algorithm incorporating compactness and monetary B Mallick, D Garg, PS Grover International Journal of Innovative Computing, Information and Control 8 (7), 2012 | 9 | 2012 |
Web Mining: Characteristics and application in ecommerce J Yadav, B Mallick Intl. J. of IJECSE 1 (4), 2011 | 9 | 2011 |
A Study of Different Partitioning Clustering Technique A Goel, B Mallick International Journal for Scientific Research and Development 3 (4), 2015 | 6 | 2015 |