Follow
Dr. Kutub Thakur
Dr. Kutub Thakur
Phd Computer Science , Pace University
Verified email at pace.edu
Title
Cited by
Cited by
Year
An investigation on cyber security threats and security models
K Thakur, M Qiu, K Gai, ML Ali
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
1872015
2D-human face recognition using SIFT and SURF descriptors of face’s feature regions
S Gupta, K Thakur, M Kumar
The Visual Computer 37 (3), 447-456, 2021
1632021
MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
G Kumar, K Thakur, MR Ayyagari
The Journal of Supercomputing, 1-34, 2020
612020
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic
W Lo, H Alqahtani, K Thakur, A Almadhor, S Chander, G Kumar
Vehicular Communications 35, 100471, 2022
572022
Impact of cyber-attacks on critical infrastructure
K Thakur, ML Ali, N Jiang, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
532016
Cyber security in social media: challenges and the way forward
K Thakur, T Hayajneh, J Tseng
IT Professional 21 (2), 41-49, 2019
522019
Keystroke biometric user verification using Hidden Markov Model
ML Ali, K Thakur, CC Tappert, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
282016
Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM
S Dargan, M Kumar, A Garg, K Thakur
Soft Computing, 1-12, 2019
272019
Information security policy for e-commerce in Saudi Arabia
K Thakur, ML Ali, K Gai, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
222016
A hybrid method for keystroke biometric user identification
ML Ali, K Thakur, MA Obaidat
Electronics 11 (17), 2782, 2022
192022
Challenges of cyber security and the emerging trends
ML Ali, K Thakur, B Atobatele
Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019
192019
Innovations of phishing defense: The mechanism, measurement and defense strategies
K Thakur, J Shan, ASK Pathan
International Journal of Communication Networks and Information Security 10 …, 2018
192018
Potential development on cyberattack and prospect analysis for cybersecurity
L Li, K Thakur, ML Ali
2020 IEEE International IOT, Electronics and Mechatronics Conference …, 2020
152020
Cybersecurity fundamentals: a real-world perspective
K Thakur, ASK Pathan
CRC Press, 2020
152020
An analysis of information security event managers
K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
142016
An intelligent algorithmically generated domain detection system
K Thakur, H Alqahtani, G Kumar
Computers & Electrical Engineering 92, 107129, 2021
132021
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet
A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur
2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022
122022
Applications of cryptography in database: a review
H Xu, K Thakur, AS Kamruzzaman, ML Ali
2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021
102021
Connectivity, Traffic Flow and Applied Statistics in Cyber Security
K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao
2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016
92016
User authentication and identification using neural network
ML Ali, K Thakur, CC Tappert
i-manager's Journal on Pattern Recognition 2 (2), 34, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20