An investigation on cyber security threats and security models K Thakur, M Qiu, K Gai, ML Ali 2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015 | 210 | 2015 |
2D-human face recognition using SIFT and SURF descriptors of face’s feature regions S Gupta, K Thakur, M Kumar The Visual Computer 37 (3), 447-456, 2021 | 167 | 2021 |
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic W Lo, H Alqahtani, K Thakur, A Almadhor, S Chander, G Kumar Vehicular Communications 35, 100471, 2022 | 66 | 2022 |
MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review G Kumar, K Thakur, MR Ayyagari The Journal of Supercomputing, 1-34, 2020 | 62 | 2020 |
Cyber security in social media: challenges and the way forward K Thakur, T Hayajneh, J Tseng IT Professional 21 (2), 41-49, 2019 | 56 | 2019 |
Impact of cyber-attacks on critical infrastructure K Thakur, ML Ali, N Jiang, M Qiu 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 56 | 2016 |
Keystroke biometric user verification using Hidden Markov Model ML Ali, K Thakur, CC Tappert, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 31 | 2016 |
Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM S Dargan, M Kumar, A Garg, K Thakur Soft Computing, 1-12, 2019 | 28 | 2019 |
Challenges of cyber security and the emerging trends ML Ali, K Thakur, B Atobatele Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019 | 24 | 2019 |
Information security policy for e-commerce in Saudi Arabia K Thakur, ML Ali, K Gai, M Qiu 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 22 | 2016 |
A hybrid method for keystroke biometric user identification ML Ali, K Thakur, MA Obaidat Electronics 11 (17), 2782, 2022 | 20 | 2022 |
Innovations of phishing defense: The mechanism, measurement and defense strategies K Thakur, J Shan, ASK Pathan International Journal of Communication Networks and Information Security 10 …, 2018 | 19 | 2018 |
Cybersecurity fundamentals: a real-world perspective K Thakur, ASK Pathan CRC Press, 2020 | 17 | 2020 |
Potential development on cyberattack and prospect analysis for cybersecurity L Li, K Thakur, ML Ali 2020 IEEE International IOT, Electronics and Mechatronics Conference …, 2020 | 16 | 2020 |
An analysis of information security event managers K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 14 | 2016 |
An intelligent algorithmically generated domain detection system K Thakur, H Alqahtani, G Kumar Computers & Electrical Engineering 92, 107129, 2021 | 13 | 2021 |
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur 2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022 | 12 | 2022 |
Applications of cryptography in database: a review H Xu, K Thakur, AS Kamruzzaman, ML Ali 2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021 | 11 | 2021 |
Nature inspired techniques and applications in intrusion detection systems: Recent progress and updated perspective K Thakur, G Kumar Archives of Computational Methods in Engineering 28 (4), 2897-2919, 2021 | 9 | 2021 |
Connectivity, Traffic Flow and Applied Statistics in Cyber Security K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao 2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016 | 9 | 2016 |