The use of artificial intelligence based techniques for intrusion detection: a review G Kumar, K Kumar, M Sachdeva Artificial Intelligence Review 34 (4), 369-387, 2010 | 185 | 2010 |
Face mask detection using YOLOv3 and faster R-CNN models: COVID-19 environment S Singh, U Ahuja, M Kumar, K Kumar, M Sachdeva Multimedia Tools and Applications 80 (13), 19753-19768, 2021 | 178 | 2021 |
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges K Singh, P Singh, K Kumar Computers & security 65, 344-372, 2017 | 126 | 2017 |
Detection of DDoS Attacks and Flash Events using Novel Information Theory Metrics S Behal, K Kumar Computer Networks, 2017 | 123 | 2017 |
A distributed approach using entropy to detect DDoS attacks in ISP domain K Kumar, RC Joshi, K Singh 2007 International Conference on Signal Processing, Communications and …, 2007 | 123 | 2007 |
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events S Behal, K Kumar, M Sachdeva Journal of Network and Computer Applications 111, 49-63, 2018 | 119 | 2018 |
Round-robin based load balancing in Software Defined Networking S Kaur, J Singh, K Kumar, Ghumman, N.S. IEEE 2nd International Conference on Computing for Sustainable Global …, 2015 | 106 | 2015 |
Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. S Behal, K Kumar Int. J. Netw. Secur. 19 (3), 383-393, 2017 | 80 | 2017 |
An efficient technique for object recognition using Shi-Tomasi corner detection algorithm M Bansal, M Kumar, M Kumar, K Kumar Soft Computing 25 (6), 4423-4432, 2021 | 77 | 2021 |
Trends in validation of DDoS research S Behal, K Kumar Procedia Computer Science 85, 7-15, 2016 | 75 | 2016 |
A comprehensive approach to discriminate DDoS attacks from flash events M Sachdeva, K Kumar, G Singh Journal of information security and applications 26, 8-22, 2016 | 73 | 2016 |
Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation A Bhandari, AL Sangal, K Kumar Security and Communication Networks 9 (13), 2222-2239, 2016 | 71 | 2016 |
Digital image forgery detection: a systematic scrutiny S Walia, K Kumar Australian Journal of Forensic Sciences 51 (5), 488-526, 2019 | 65 | 2019 |
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture K Kaur, V Mangat, K Kumar Computer Science Review 38, 100298, 2020 | 61 | 2020 |
Detection of HELLO flood attack on LEACH protocol S Magotra, K Kumar Advance Computing Conference (IACC), 2014 IEEE International, 193-198, 2014 | 60 | 2014 |
Impact analysis of recent DDoS attacks K Arora, K Kumar, M Sachdeva International Journal on Computer Science and Engineering 3 (2), 877-883, 2011 | 60 | 2011 |
DDoS Incidents and their Impact: A Review. M Sachdeva, G Singh, K Kumar, K Singh Int. Arab J. Inf. Technol. 7 (1), 14-20, 2010 | 57 | 2010 |
A systematic review of IP traceback schemes for denial of service attacks K Singh, P Singh, K Kumar Computers & Security 56, 111-139, 2016 | 56 | 2016 |
Characterizing DDoS attacks and flash events: Review, research gaps and future directions S Behal, K Kumar, M Sachdeva Computer Science Review 25, 101-114, 2017 | 55 | 2017 |
Detection of DDoS Attacks and Flash Events using Information Theory Metrics - An Empirical Investigation S Behal, K Kumar Computer Communications, 2017 | 55 | 2017 |