Latifur Khan
Titel
Geciteerd door
Geciteerd door
Jaar
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16 (4), 507-521, 2007
4842007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (6), 859-874, 2010
4022010
A machine learning approach to android malware detection
J Sahs, L Khan
2012 European Intelligence and Security Informatics Conference, 141-147, 2012
3642012
Hypoglycaemic activity of Coccinia indica and Momordica charantia in diabetic rats: depression of the hepatic gluconeogenic enzymes glucose-6-phosphatase …
BA Shibib, LA Khan, R Rahman
Biochemical Journal 292 (1), 267-270, 1993
3401993
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
3372005
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3082010
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2612011
Ontology construction for information selection
L Khan, F Luo
14th IEEE International Conference on Tools with Artificial Intelligence …, 2002
2462002
Retrieval effectiveness of an ontology-based model for information selection
L Khan, D McLeod, E Hovy
The VLDB Journal 13 (1), 71-85, 2004
2422004
American Artifacts
JD Prown, K Haltman
East Lansing: Michigan State University, 2000
222*2000
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory
F Luo, Y Yang, J Zhong, H Gao, L Khan, DK Thompson, J Zhou
BMC bioinformatics 8 (1), 1-17, 2007
2182007
Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps
D Sounthiraraj, J Sahs, G Greenwood, Z Lin, L Khan
In Proceedings of the 21st Annual Network and Distributed System Security …, 2014
1952014
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
1792008
Estimating twitter user location using social interactions--a content based approach
S Chandra, L Khan, FB Muhaya
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1732011
Storage and retrieval of large rdf graph using hadoop and mapreduce
MF Husain, P Doshi, L Khan, B Thuraisingham
IEEE International Conference on Cloud Computing, 680-686, 2009
1692009
Secure knowledge management: confidentiality, trust, and privacy
E Bertino, LR Khan, R Sandhu, B Thuraisingham
IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006
1622006
Flow-based identification of botnet traffic by mining multiple log files
MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen
2008 first international conference on distributed framework and …, 2008
1412008
Classification and adaptive novel class detection of feature-evolving data streams
MM Masud, Q Chen, L Khan, CC Aggarwal, J Gao, J Han, A Srivastava, ...
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1484-1497, 2012
1362012
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33 (1), 213-244, 2012
1332012
Addressing concept-evolution in concept-drifting data streams
MM Masud, Q Chen, L Khan, C Aggarwal, J Gao, J Han, B Thuraisingham
2010 IEEE International Conference on Data Mining, 929-934, 2010
1322010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20