Simulation and Analysis of DDoS Attack on Connected Autonomous Vehicular Network using OMNET++ KM Tauheed, M Subhrajit, M Akshay, J Ahmad 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2018 | 19 | 2018 |
Evaluating accuracy of the Tobii eye tracker 5 A Housholder, J Reaban, A Peregrino, G Votta, TK Mohd International Conference on Intelligent Human Computer Interaction, 379-390, 2021 | 16 | 2021 |
Multi-modal data fusion in enhancing human-machine interaction for robotic applications: A survey TK Mohd, N Nguyen, AY Javaid arXiv preprint arXiv:2202.07732, 2022 | 15 | 2022 |
Remote desktop backdoor implementation with reverse TCP payload using open source tools for instructional use Y Kolli, TK Mohd, AY Javaid 2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018 | 14 | 2018 |
Sensors in autonomous vehicles: A survey R Ayala, TK Mohd Journal of Autonomous Vehicles and Systems 1 (3), 031003, 2021 | 12 | 2021 |
Survey on types of cyber attacks on operating system vulnerabilities since 2018 onwards MA Vander–Pallen, P Addai, S Isteefanos, TK Mohd 2022 IEEE World AI IoT Congress (AIIoT), 01-07, 2022 | 11 | 2022 |
Recent trends in software development: low-code solutions R Benac, TK Mohd Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3, 525-533, 2022 | 7 | 2022 |
IoT in Health Care Industry: A Promising Prospect K Piya, QA Au, S Shrestha, A Singh, TK Mohd 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021 | 7 | 2021 |
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning V Shriya, KM Tauheed, J Ahmad IEEE International Conference on Electro/Information Technology (EIT), 2018 | 7 | 2018 |
Facial Detection in Low Light Environments Using OpenCV C Le, TK Mohd 2022 IEEE World AI IoT Congress (AIIoT), 624-628, 2022 | 6 | 2022 |
Multi-modal data fusion of Voice and EMG data for robotic control KM Tauheed, J Carvalho, AY Javaid 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2018 | 5* | 2018 |
Analysis of reinforcement learning in autonomous vehicles E Jebessa, K Olana, K Getachew, S Isteefanos, TK Mohd 2022 IEEE 12th Annual Computing and Communication Workshop and Conference …, 2022 | 4 | 2022 |
Analyzing strengths and weaknesses of Modern Game Engines TK Mohd, F Bravo-Garcia, L Love, M Gujadhur, J Nyadu International Journal of Computer Theory and Engineering 15 (1), 54-60, 2023 | 3 | 2023 |
Analysis of various vulnerabilities in the raspbian operating system and solutions C Le, AM Grande, AJ Carmine, J Thompson, TK Mohd 2022 IEEE World AI IoT Congress (AIIoT), 01-06, 2022 | 3 | 2022 |
Risks in Blockchain–A Survey about Recent Attacks with Mitigation Methods and Solutions for Overall K Mrazek, B Holton, C Cathcart, J Speirer, J Do, TK Mohd 2022 IEEE International Conference on Electro Information Technology (eIT), 5-10, 2022 | 3 | 2022 |
Prevention and Detection of Network Attacks: A Comprehensive Study P Addai, R Freas, EM Tesfa, M Sellers, TK Mohd International Conference on Decision Support System Technology, 56-66, 2023 | 2 | 2023 |
Comparative Analysis on Various CSS and JavaScript Frameworks T Khan Mohd, J Thompson, A Carmine, G Reuter Journal of Software 17 (6), 282-291, 2022 | 2 | 2022 |
Power and Telecommunication Lines Detection and Avoidance for Drones P Addai, TK Mohd 2022 IEEE World AI IoT Congress (AIIoT), 118-123, 2022 | 2 | 2022 |
Using LSTM models on accelerometer data to improve accuracy of Tap Strap 2 wearable keyboard K Mrazek, TK Mohd International Conference on Intelligent Human Computer Interaction, 27-38, 2021 | 2 | 2021 |
The Tap Strap 2: Evaluating performance of one-handed wearable keyboard and mouse K Mrazek, B Holton, T Klein, I Khan, T Ayele, T Khan Mohd HCI International 2021-Late Breaking Papers: Multimodality, eXtended Reality …, 2021 | 2 | 2021 |