关注
Dr. Krishan Kumar Saluja
Dr. Krishan Kumar Saluja
Professor, Information Technology, UIET, Panjab University, Chandigarh
在 pu.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
The use of artificial intelligence based techniques for intrusion detection: a review
G Kumar, K Kumar, M Sachdeva
Artificial Intelligence Review 34 (4), 369-387, 2010
1852010
Face mask detection using YOLOv3 and faster R-CNN models: COVID-19 environment
S Singh, U Ahuja, M Kumar, K Kumar, M Sachdeva
Multimedia Tools and Applications 80 (13), 19753-19768, 2021
1782021
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges
K Singh, P Singh, K Kumar
Computers & security 65, 344-372, 2017
1262017
Detection of DDoS Attacks and Flash Events using Novel Information Theory Metrics
S Behal, K Kumar
Computer Networks, 2017
1232017
A distributed approach using entropy to detect DDoS attacks in ISP domain
K Kumar, RC Joshi, K Singh
2007 International Conference on Signal Processing, Communications and …, 2007
1232007
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events
S Behal, K Kumar, M Sachdeva
Journal of Network and Computer Applications 111, 49-63, 2018
1192018
Round-robin based load balancing in Software Defined Networking
S Kaur, J Singh, K Kumar, Ghumman, N.S.
IEEE 2nd International Conference on Computing for Sustainable Global …, 2015
1062015
Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review.
S Behal, K Kumar
Int. J. Netw. Secur. 19 (3), 383-393, 2017
802017
An efficient technique for object recognition using Shi-Tomasi corner detection algorithm
M Bansal, M Kumar, M Kumar, K Kumar
Soft Computing 25 (6), 4423-4432, 2021
772021
Trends in validation of DDoS research
S Behal, K Kumar
Procedia Computer Science 85, 7-15, 2016
752016
A comprehensive approach to discriminate DDoS attacks from flash events
M Sachdeva, K Kumar, G Singh
Journal of information security and applications 26, 8-22, 2016
732016
Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation
A Bhandari, AL Sangal, K Kumar
Security and Communication Networks 9 (13), 2222-2239, 2016
712016
Digital image forgery detection: a systematic scrutiny
S Walia, K Kumar
Australian Journal of Forensic Sciences 51 (5), 488-526, 2019
652019
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture
K Kaur, V Mangat, K Kumar
Computer Science Review 38, 100298, 2020
612020
Detection of HELLO flood attack on LEACH protocol
S Magotra, K Kumar
Advance Computing Conference (IACC), 2014 IEEE International, 193-198, 2014
602014
Impact analysis of recent DDoS attacks
K Arora, K Kumar, M Sachdeva
International Journal on Computer Science and Engineering 3 (2), 877-883, 2011
602011
DDoS Incidents and their Impact: A Review.
M Sachdeva, G Singh, K Kumar, K Singh
Int. Arab J. Inf. Technol. 7 (1), 14-20, 2010
572010
A systematic review of IP traceback schemes for denial of service attacks
K Singh, P Singh, K Kumar
Computers & Security 56, 111-139, 2016
562016
Characterizing DDoS attacks and flash events: Review, research gaps and future directions
S Behal, K Kumar, M Sachdeva
Computer Science Review 25, 101-114, 2017
552017
Detection of DDoS Attacks and Flash Events using Information Theory Metrics - An Empirical Investigation
S Behal, K Kumar
Computer Communications, 2017
552017
系统目前无法执行此操作,请稍后再试。
文章 1–20