Follow
Rajesh Ganesan
Rajesh Ganesan
Verified email at gmu.edu
Title
Cited by
Cited by
Year
Wavelet-based multiscale statistical process monitoring: A literature review
R Ganesan, TK Das, V Venkataraman
IIE transactions 36 (9), 787-806, 2004
1762004
Accuracy of reinforcement learning algorithms for predicting aircraft taxi-out times: A case-study of Tampa Bay departures
P Balakrishna, R Ganesan, L Sherry
Transportation Research Part C: Emerging Technologies 18 (6), 950-962, 2010
1352010
Vulcon: A system for vulnerability prioritization, mitigation, and management
KA Farris, A Shah, G Cybenko, R Ganesan, S Jajodia
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-28, 2018
772018
Optimal scheduling of cybersecurity analysts for minimizing risk
R Ganesan, S Jajodia, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (4), 1-32, 2017
612017
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning
R Ganesan, S Jajodia, A Shah, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016
612016
Wavelet-based identification of delamination defect in CMP (Cu-low k) using nonstationary acoustic emission signal
R Ganesan, TK Das, AK Sikder, A Kumar
IEEE Transactions on Semiconductor Manufacturing 16 (4), 677-685, 2003
592003
Estimating taxi-out times with a reinforcement learning algorithm
P Balakrishna, R Ganesan, L Sherry, BS Levy
2008 IEEE/AIAA 27th Digital Avionics Systems Conference, 3. D. 3-1-3. D. 3-12, 2008
512008
Airport taxi-out prediction using approximate dynamic programming: intelligence-based paradigm
P Balakrishna, R Ganesan, L Sherry
Transportation research record 2052 (1), 54-61, 2008
332008
System for multiresolution analysis assisted reinforcement learning approach to run-by-run control
R Ganesan, TK Das, KM Ramachandran
US Patent 7,672,739, 2010
312010
Detecting stealthy botnets in a resource-constrained environment using reinforcement learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 2017 Workshop on Moving Target Defense, 75-85, 2017
302017
A methodology to measure and monitor level of operational effectiveness of a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
International Journal of Information Security 17, 121-134, 2018
292018
Online end point detection in CMP using SPRT of wavelet decomposed sensor data
TK Das, R Ganesan, AK Sikder, A Kumar
IEEE transactions on semiconductor manufacturing 18 (3), 440-447, 2005
282005
Static sectorization approach to dynamic airspace configuration using approximate dynamic programming
S Kulkarni, R Ganesan, L Sherry
2011 Integrated Communications, Navigation, and Surveillance Conference …, 2011
272011
Understanding tradeoffs between throughput, quality, and cost of alert analysis in a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Transactions on Information Forensics and Security 14 (5), 1155-1170, 2018
252018
Application of reinforcement learning algorithms for predicting taxi-out times
P Balakrishna, R Ganesan, L Sherry
Proceedings of the 8th ATM R&D Seminars, Napa, USA, 2009
242009
Fake document generation for cyber deception by manipulating text comprehensibility
P Karuna, H Purohit, S Jajodia, R Ganesan, O Uzuner
IEEE Systems Journal 15 (1), 835-845, 2020
212020
A multiresolution analysis-assisted reinforcement learning approach to run-by-run control
R Ganesan, TK Das, KM Ramachandran
IEEE transactions on automation science and engineering 4 (2), 182-193, 2007
212007
A comprehensive study in data mining frameworks for intrusion detection
R Venkatesan, R Ganesan, AAL Selvakumar
International Journal of Advanced Computer Research 2 (7), 29-34, 2012
202012
A multiscale Bayesian SPRT approach for online process monitoring
R Ganesan, ANV Rao, TK Das
IEEE transactions on semiconductor manufacturing 21 (3), 399-412, 2008
202008
Generating hard to comprehend fake documents for defensive cyber deception
P Karuna, H Purohit, R Ganesan, S Jajodia
IEEE Intelligent Systems 33 (5), 16-25, 2018
182018
The system can't perform the operation now. Try again later.
Articles 1–20