Vandana Janeja, Ph.D.
Affiliations: | 2007 | Rutgers The State University of New Jersey - Newark, United States |
Area:
Computer ScienceGoogle:
"Vandana Janeja"Parents
Sign in to add mentorNabil R. Adam | grad student | 2007 | Rutgers, Newark | |
(Anomaly detection in heterogeneous datasets.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Tambe R, Karabatis G, Janeja VP. (2015) Context aware discovery in web data through anomaly detection International Journal of Web Engineering and Technology. 10: 3-30 |
Shi L, Gangopadhyay A, Janeja VP. (2014) STenSr: Spatio-temporal tensor streams for anomaly detection and pattern discovery Knowledge and Information Systems. 1-21 |
McGuire MP, Janeja VP, Gangopadhyay A. (2013) Mining sensor datasets with spatiotemporal neighborhoods Journal of Spatial Information Science. 6: 1-42 |
Janeja VP, Adam NR, Atluri V, et al. (2010) Spatial neighborhood based anomaly detection in sensor datasets Data Mining and Knowledge Discovery. 20: 221-258 |
Janeja VP, Atluri V. (2009) Spatial outlier detection in heterogeneous neighborhoods Intelligent Data Analysis. 13: 85-107 |
Dey S, Janeja VP, Gangopadhyay A. (2009) Temporal neighborhood discovery using Markov models Proceedings - Ieee International Conference On Data Mining, Icdm. 110-119 |
Adam N, Janeja VP, Paliwal AV, et al. (2007) Approach for discovering and handling crisis in a service-oriented environment Isi 2007: 2007 Ieee Intelligence and Security Informatics. 16-24 |
Adam N, Atluri V, Janeja VP, et al. (2006) Semantics-based threat structure mining Acm International Conference Proceeding Series. 151: 367-368 |
Adam NR, Atluri V, Koslowski R, et al. (2006) Secure interoperation for effective data mining in border control and homeland security applications Acm International Conference Proceeding Series. 151: 124-125 |
Janeja VP, Atluri V, Vaidya J, et al. (2005) Collusion set detection through outlier discovery Lecture Notes in Computer Science. 3495: 1-13 |