An investigation on cyber security threats and security models K Thakur, M Qiu, K Gai, ML Ali 2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015 | 209 | 2015 |
Security threats in mobile ad hoc network K Biswas, ML Ali | 158 | 2007 |
Keystroke biometric systems for user authentication ML Ali, JV Monaco, CC Tappert, M Qiu Journal of Signal Processing Systems 86, 175-190, 2017 | 142 | 2017 |
Impact of cyber-attacks on critical infrastructure K Thakur, ML Ali, N Jiang, M Qiu 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 56 | 2016 |
Authentication and identification methods used in keystroke biometric systems ML Ali, CC Tappert, M Qiu, JV Monaco 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 33 | 2015 |
Spoofing key-press latencies with a generative keystroke dynamics model JV Monaco, ML Ali, CC Tappert 2015 IEEE 7th international conference on biometrics theory, applications …, 2015 | 32 | 2015 |
Keystroke biometric user verification using Hidden Markov Model ML Ali, K Thakur, CC Tappert, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 31 | 2016 |
Challenges of cyber security and the emerging trends ML Ali, K Thakur, B Atobatele Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019 | 23 | 2019 |
Information security policy for e-commerce in Saudi Arabia K Thakur, ML Ali, K Gai, M Qiu 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 22 | 2016 |
A hybrid method for keystroke biometric user identification ML Ali, K Thakur, MA Obaidat Electronics 11 (17), 2782, 2022 | 20 | 2022 |
Potential development on cyberattack and prospect analysis for cybersecurity L Li, K Thakur, ML Ali 2020 IEEE International IOT, Electronics and Mechatronics Conference …, 2020 | 16 | 2020 |
Pohmm/svm: A hybrid approach for keystroke biometric user authentication ML Ali, CC Tappert 2018 IEEE International Conference on Real-time Computing and Robotics (RCAR …, 2018 | 15 | 2018 |
An analysis of information security event managers K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 14 | 2016 |
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur 2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022 | 12 | 2022 |
Applications of cryptography in database: a review H Xu, K Thakur, AS Kamruzzaman, ML Ali 2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021 | 11 | 2021 |
Connectivity, Traffic Flow and Applied Statistics in Cyber Security K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao 2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016 | 9 | 2016 |
User authentication and identification using neural network ML Ali, K Thakur, CC Tappert i-manager's Journal on Pattern Recognition 2 (2), 34, 2015 | 9 | 2015 |
Social engineering incidents and preventions A Kamruzzaman, K Thakur, S Ismat, ML Ali, K Huang, HN Thakur 2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023 | 8 | 2023 |
Biometric studies with hidden Markov model and its extension on short fixed-text input ML Ali, JV Monaco, CC Tappert 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017 | 8 | 2017 |
Cloud computing and its security issues K Thakur, L Tao, T Wang, ML Ali Application and Theory of Computer Technology 2 (1), 1-10, 2017 | 8 | 2017 |