Modeling and analysis of identity threat behaviors through text mining of identity theft stories RN Zaeem, M Manoharan, Y Yang, KS Barber Computers & Security 65, 50-63, 2017 | 93 | 2017 |
Modelling and analysis of identity threat behaviors through text mining of identity theft stories Y Yang, M Manoharan, KS Barber 2014 IEEE Joint Intelligence and Security Informatics Conference, 184-191, 2014 | 29 | 2014 |
Risk kit: Highlighting vulnerable identity assets for specific age groups RN Zaeem, M Manoharan, KS Barber 2016 European Intelligence and Security Informatics Conference (EISIC), 32-38, 2016 | 20 | 2016 |
DLS magician: Promoting early-stage collaboration by automating UI design process in an E&P environment J Guo, Z Li, S Ju, M Manoharan, A Knight Proceedings of the 25th International Conference on Intelligent User …, 2020 | 5 | 2020 |
Is there a Doctor in the Crowd? Diagnosis Needed!(for less than $5) J Cheng, M Manoharan, Y Zhang, M Lease iConference 2015 Proceedings, 2015 | 5 | 2015 |
Is there a doctor in the crowd J Cheng, M Manoharan, Y Zhang, M Lease Diagnosis needed, 2015 | 5 | 2015 |
Sign Language Recognition using Thinning algorithm SN Omkar, M Monisha ICTACT Journal On Image And Video Processing 2 (01), 2011 | 5 | 2011 |
A survey on the application of machine learning algorithms to predict software aging M Monisha, S Sherugar, S Bansal, R Mann, BR Mohan International Journal on Advanced Computer Theory and Engineering (IJACTE) 2 (5), 2013 | 4 | 2013 |
Converting text-based requirements to a live prototype Z Li, Z Ju, M Manoharan, A Knight, J Guo US Patent 11,295,082, 2022 | 1 | 2022 |
Crowdsourcing Relevance Assessments through a Game-based Approach using Social Networking M Manoharan, M Parikh | | |