default search action
Sikha Bagui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Sadaf Charkhabi, Peyman Samimi, Sikha Bagui, Dustin Mink, Subhash C. Bagui:
Node Classification of Network Threats Leveraging Graph-Based Characterizations Using Memgraph. Comput. 13(7): 171 (2024) - [j38]Fariha Moomtaheen, Sikha Bagui, Subhash C. Bagui, Dustin Mink:
Extended Isolation Forest for Intrusion Detection in Zeek Data. Inf. 15(7): 404 (2024) - [c16]Sarah Cameron, Tony Pham, Sikha Bagui:
A Case Study of Taking AP Computer Science Principles: A Student's Perspective. SIGCSE (2) 2024: 1588-1589 - 2023
- [j37]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Sakthivel Subramaniam:
Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data. Comput. 12(10): 204 (2023) - [j36]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Tirthankar Ghosh, Russell Plenkers, Tom McElroy, Stephan Dulaney, Sajida Shabanali:
Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework. Data 8(1): 18 (2023) - [j35]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Sakthivel Subramaniam, Daniel Wallace:
Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks. Future Internet 15(4): 130 (2023) - [j34]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Michael Plain, Jadarius Hill, Marshall Elam:
Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22. Future Internet 15(7): 236 (2023) - [j33]Tirthankar Ghosh, Sikha Bagui, Subhash C. Bagui, Martin Kadzis, Jackson Bare:
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis. J. Cybersecur. Priv. 3(4): 895-913 (2023) - 2022
- [j32]Sikha Bagui, Mary Walauskis, Robert DeRush, Huyen Praviset, Shaunda Boucugnani:
Spark Configurations to Optimize Decision Tree Classification on UNSW-NB15. Big Data Cogn. Comput. 6(2): 38 (2022) - [j31]Renee Carnley, Sikha Bagui:
A Public Infrastructure for a Trusted Wireless World. Future Internet 14(7): 200 (2022) - [j30]Sikha Bagui, Hunter Brock:
Machine Learning for Android Scareware Detection. J. Inf. Technol. Res. 15(1): 1-15 (2022) - [j29]Sikha Bagui, Dustin Mink, Subhash C. Bagui, Tirthankar Ghosh, Tom McElroy, Esteban Paredes, Nithisha Khasnavis, Russell Plenkers:
Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark's Machine Learning in the Big Data Framework. Sensors 22(20): 7999 (2022) - 2021
- [j28]Dustin Mink, Jeffrey Todd McDonald, Sikha Bagui, William Bradley Glisson, Jordan Shropshire, Ryan Benton, Samuel H. Russ:
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B. Big Data Cogn. Comput. 5(2): 27 (2021) - [j27]Sikha Bagui, Jason Simonds, Russell Plenkers, Timothy A. Bennett, Subhash C. Bagui:
Classifying UNSW-NB15 Network Traffic in the Big Data Framework Using Random Forest in Spark. Int. J. Big Data Intell. Appl. 2(1): 39-61 (2021) - [j26]Sikha Bagui, Keenal M. Shah, Yizhi Hu, Subhash C. Bagui:
Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm. Int. J. Inf. Secur. Priv. 15(1): 26-43 (2021) - [j25]Sikha Bagui, Kunqi Li:
Resampling imbalanced data for network intrusion detection datasets. J. Big Data 8(1): 6 (2021) - [c15]Tobias Jacob, Raffaele Galliera, Muddasar Ali, Sikha Bagui:
Marine Vessel Tracking using a Monocular Camera. DeLTA 2021: 17-28 - [i1]Tobias Jacob, Raffaele Galliera, Muddasar Ali, Sikha Bagui:
Marine vessel tracking using a monocular camera. CoRR abs/2108.10367 (2021) - 2020
- [j24]Sikha Bagui, Keerthi Devulapalli, John Coffey:
A heuristic approach for load balancing the FP-growth algorithm on MapReduce. Array 7: 100035 (2020) - [j23]Katie Jin, Sikha Bagui:
Apache Spark SVM for Predicting Obstructive Sleep Apnea. Big Data Cogn. Comput. 4(4): 25 (2020) - [j22]Sikha Bagui, Keerthi Devulapalli, Sharon K. John:
MapReduce Implementation of a Multinomial and Mixed Naive Bayes Classifier. Int. J. Intell. Inf. Technol. 16(2): 1-23 (2020) - [j21]Sikha Bagui, Richard P. Stanley:
Mining frequent itemsets from streaming transaction data using genetic algorithms. J. Big Data 7(1): 54 (2020) - [c14]P. Renee Carnley, Pam Rowland, Dave Bishop, Sikha Bagui, Matt Miller:
Trusted Digital Identities for Mobile Devices. DASC/PiCom/CBDCom/CyberSciTech 2020: 483-490
2010 – 2019
- 2019
- [j20]Amitabh Mishra, Sikha Bagui, John Compo:
Design and Testing of a Real-Time Audio-Quality Feedback System for Weather Broadcasts and a Framework for a Weather Broadcast Transmission Technology Switch. IEEE Access 7: 158782-158797 (2019) - [j19]Sikha Bagui, Arup Kumar Mondal, Subhash C. Bagui:
Improving the Performance of kNN in the MapReduce Framework Using Locality Sensitive Hashing. Int. J. Distributed Syst. Technol. 10(4): 1-16 (2019) - [j18]Sikha Bagui, Probal Chandra Dhar:
Positive and negative association rule mining in Hadoop's MapReduce environment. J. Big Data 6: 75 (2019) - [j17]Sikha Bagui, Ezhil Kalaimannan, Subhash C. Bagui, Debarghya Nandi, Anthony Pinto:
Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Secur. Priv. 2(6) (2019) - [c13]Sikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White:
Classifying Phishing Email Using Machine Learning and Deep Learning. Cyber Security 2019: 1-2 - 2018
- [j16]Sikha Bagui, Keerthi Devulapalli:
Comparison of Hive's query optimisation techniques. Int. J. Big Data Intell. 5(4): 243-257 (2018) - [c12]Sikha Bagui, Arup Kumar Mondal, Subhash C. Bagui:
Using locality sensitive hashing to improve the KNN algorithm in the mapreduce framework. ACM Southeast Regional Conference 2018: 32:1 - [c11]Sikha Bagui, Probal Chandra Dhar:
Mining positive and negative association rules in Hadoop's MapReduce environment. ACM Southeast Regional Conference 2018: 33:1 - [c10]Sikha Bagui, Debarghya Nandi, Subhash C. Bagui:
A hybrid genetic algorithm for network intrusion detection. ACM Southeast Regional Conference 2018: 34:1 - [c9]Sikha Bagui, Sharon K. John, John P. Baggs:
A comparative study of mapreduce and hive based on the design of the information gain algorithm for analytical workloads. ACM Southeast Regional Conference 2018: 37:1 - [c8]Sikha Bagui, Sharon K. John, John P. Baggs, Subhash C. Bagui:
A Parallel Implementation of Information Gain Using Hive in Conjunction with MapReduce for Continuous Features. PAKDD (Workshops) 2018: 283-294 - 2017
- [j15]Xingang Fang, Sikha Bagui, Subhash C. Bagui:
Improving virtual screening predictive accuracy of Human kallikrein 5 inhibitors using machine learning models. Comput. Biol. Chem. 69: 110-119 (2017) - 2016
- [j14]Evorell Fridge, Sikha Bagui:
Impact of Automated Software Testing Tools on Reflective Thinking and Student Performance in Introductory Computer Science Programming Classes. Int. J. Inf. Commun. Technol. Educ. 12(1): 22-37 (2016) - 2015
- [j13]Sikha Bagui, Loi Tang Nguyen:
Database Sharding: To Provide Fault Tolerance and Scalability of Big Data on the Cloud. Int. J. Cloud Appl. Comput. 5(2): 36-52 (2015) - 2014
- [c7]Alfred Zimmermann, Bilal Gonen, Rainer Schmidt, Eman El-Sheikh, Sikha Bagui, Norman Wilde:
Adaptable Enterprise Architectures for Software Evolution of SmartLife Ecosystems. EDOC Workshops 2014: 316-323 - [c6]Bilal Gonen, Xingang Fang, Eman El-Sheikh, Sikha Bagui, Norman Wilde, Alfred Zimmermann, Ilia Petrov:
Maintaining SOA Systems of the Future - How Can Ontological Modeling Help?. KEOD 2014: 376-381 - 2012
- [j12]Sikha Bagui, Richard Sweetman:
Modeling Service Data Objects (SDOs) to the Entity-Relationship (ER) Model. Int. J. Inf. Technol. Web Eng. 7(3): 14-36 (2012) - 2011
- [j11]Sikha Bagui, Mohammad Islam, Subhash C. Bagui:
An Architecture for Query Optimization Using Association Rule Mining. Int. J. Knowl. Based Organ. 1(4): 32-55 (2011) - 2010
- [j10]Sikha Bagui, Jiri Just, Subhash C. Bagui, Rohan Hemasinha:
Using a cosine-type measure to derive strong association mining rules. Int. J. Knowl. Eng. Data Min. 1(1): 69-83 (2010) - [c5]Sikha Bagui, Mohammad Islam:
Query optimization in large databases using association rule mining. ACM Southeast Regional Conference 2010: 85
2000 – 2009
- 2009
- [j9]Sikha Bagui, Jiri Just, Subhash C. Bagui:
Deriving strong association mining rules using a dependency criterion, the lift measure. Int. J. Data Anal. Tech. Strateg. 1(3): 297-312 (2009) - [j8]Sikha Bagui, Adam Loggins:
Generating Join Queries for Large Databases and Web Services. Int. J. Inf. Technol. Web Eng. 4(2): 45-60 (2009) - [j7]Sikha Bagui:
Mapping OWL to the Entity Relationship and Extended Entity Relationship models. Int. J. Knowl. Web Intell. 1(1/2): 125-149 (2009) - [c4]Lakshmi Prayaga, Laura J. White, Sikha Bagui:
Innovative Strategies to Build IT Workforce. CSEE&T 2009: 202-209 - [p1]Sikha Bagui:
An Approach to Mining Crime Patterns. Selected Readings on Database Technologies and Applications 2009: 305-329 - 2007
- [j6]Sikha Bagui, Dustin Mink, Patrick Cash:
Data mining techniques to study voting patterns in the US. Data Sci. J. 6: 46-63 (2007) - [j5]Sikha Bagui:
Mapping XML Schema to Entity Relationship and Extended Entity Relationship Models. Int. J. Intell. Inf. Database Syst. 1(3/4): 325-345 (2007) - [j4]Sikha Bagui:
A formal definition for translating XML documents to the entity relationship model. Int. J. Metadata Semant. Ontologies 2(1): 54-66 (2007) - [c3]Sikha Bagui:
Developing a Conceptual Model for XML Schema. SWWS 2007: 69-74 - 2006
- [b1]Sikha Bagui, Richard Walsh Earp:
Learning SQL on SQL server 2005 - the simplest way to learn to query SQL server. O'Reilly 2006, ISBN 978-0-596-10215-9, pp. I-XVI, 1-324 - [j3]Sikha Bagui:
An Approach to Mining Crime Patterns. Int. J. Data Warehous. Min. 2(1): 50-80 (2006) - [c2]Sikha Bagui, Damien Walker:
A Java Based Parser Software for Converting XML Documents to the ER Model and Relational Databases. SWWS 2006: 166-169 - 2005
- [c1]Sikha Bagui:
Rules for migrating from ER and EER diagrams to Object-Relationship (OR) diagrams. ACM Southeast Regional Conference (1) 2005: 243-244 - [r1]Sikha Bagui:
Extended Entity Relationship Modeling. Encyclopedia of Database Technologies and Applications 2005: 233-239 - 2003
- [j2]Sikha Bagui:
Achievements and Weaknesses of Object-Oriented Databases. J. Object Technol. 2(4): 29-41 (2003) - [j1]Subhash C. Bagui, Sikha Bagui, Kuhu Pal, Nikhil R. Pal:
Breast cancer detection using rank nearest neighbor classification rules. Pattern Recognit. 36(1): 25-34 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint