Intelligent phishing detection system for e-banking using fuzzy data mining M Aburrous, MA Hossain, K Dahal, F Thabtah Expert systems with applications 37 (12), 7913-7921, 2010 | 210 | 2010 |
An adaptive ensemble classifier for mining concept drifting data streams DM Farid, L Zhang, A Hossain, CM Rahman, R Strachan, G Sexton, ... Expert Systems with Applications 40 (15), 5895-5906, 2013 | 151 | 2013 |
Generator maintenance scheduling in power systems using metaheuristic-based hybrid approaches KP Dahal, N Chakpitak Electric power systems research 77 (7), 771-779, 2007 | 151 | 2007 |
Recommendation based trust model with an effective defence scheme for MANETs AM Shabut, KP Dahal, SK Bista, IU Awan IEEE Transactions on mobile computing 14 (10), 2101-2115, 2014 | 128 | 2014 |
Remote patient monitoring: a comprehensive study LP Malasinghe, N Ramzan, K Dahal Journal of Ambient Intelligence and Humanized Computing 10 (1), 57-76, 2019 | 116 | 2019 |
Portfolio optimization using multi-obj ective genetic algorithms P Skolpadungket, K Dahal, N Harnpornchai 2007 IEEE Congress on Evolutionary Computation, 516-523, 2007 | 114 | 2007 |
Goal programming approach to maintenance scheduling of generating units in large scale power systems LM Moro, A Ramos IEEE Transactions on Power Systems 14 (3), 1021-1028, 1999 | 113 | 1999 |
Predicting phishing websites using classification mining techniques with experimental case studies M Aburrous, MA Hossain, K Dahal, F Thabtah 2010 Seventh International Conference on Information Technology: New …, 2010 | 105 | 2010 |
Generator maintenance scheduling using a genetic algorithm with a fuzzy evaluation function KP Dahal, CJ Aldridge, JR McDonald Fuzzy Sets and Systems 102 (1), 21-29, 1999 | 95 | 1999 |
Tuning struggle strategy in genetic algorithms for scheduling in computational grids F Xhafa, B Duran, A Abraham, KP Dahal 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 86 | 2008 |
Experimental case studies for investigating e-banking phishing techniques and attack strategies M Aburrous, MA Hossain, K Dahal, F Thabtah Cognitive Computation 2 (3), 242-253, 2010 | 73 | 2010 |
Generator maintenance scheduling of electric power systems using genetic algorithms with integer representation KP Dahal, JR McDonald IET Digital Library, 1997 | 72 | 1997 |
Intelligent phishing website detection system using fuzzy techniques M Aburrous, MA Hossain, F Thabatah, K Dahal 2008 3rd International Conference on Information and Communication …, 2008 | 69 | 2008 |
Test data generation from UML state machine diagrams using gas C Doungsa-ard, K Dahal, A Hossain, T Suwannasart International Conference on Software Engineering Advances (ICSEA 2007), 47-47, 2007 | 66 | 2007 |
A GA (TS) hybrid algorithm for scheduling in computational grids F Xhafa, JA Gonzalez, KP Dahal, A Abraham International Conference on Hybrid Artificial Intelligence Systems, 285-292, 2009 | 60 | 2009 |
A port system simulation facility with an optimization capability K Dahal, S Galloway, G Burt, J Mcdonald, I Hopkins International Journal of Computational Intelligence and Applications 3 (04 …, 2003 | 55 | 2003 |
Intelligent learning algorithms for active vibration control A Madkour, MA Hossain, KP Dahal, H Yu IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007 | 54 | 2007 |
Knowledge-based genetic algorithm for unit commitment CJ Aldridge, S McKee, JR McDonald, SJ Galloway, KP Dahal, ME Bradley, ... IEE Proceedings-Generation, Transmission and Distribution 148 (2), 146-152, 2001 | 46 | 2001 |
Modelling intelligent phishing detection system for e-banking using fuzzy data mining MR Aburrous, A Hossain, K Dahal, F Thabatah 2009 International Conference on CyberWorlds, 265-272, 2009 | 45 | 2009 |
Evolutionary scheduling K Dahal, KC Tan, PI Cowling Springer Science & Business Media, 2007 | 43 | 2007 |