An investigation on cyber security threats and security models K Thakur, M Qiu, K Gai, ML Ali 2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015 | 161 | 2015 |
Security threats in mobile ad hoc network K Biswas, ML Ali | 158 | 2007 |
Keystroke biometric systems for user authentication ML Ali, JV Monaco, CC Tappert, M Qiu Journal of Signal Processing Systems 86, 175-190, 2017 | 137 | 2017 |
Impact Of Cyber-Attacks On Critical Infrastructure K Thakur, ML Ali, N Jiang, M Qiu 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 51 | 2016 |
Authentication and Identification Methods Used in Keystroke Biometric Systems ML Ali, CC Tappert, M Qiu, JV Monaco 2015 IEEE International Symposium on Big Data Security on Cloud …, 2015 | 33 | 2015 |
Spoofing key-press latencies with a generative keystroke dynamics model JV Monaco, ML Ali, CC Tappert 2015 IEEE 7th international conference on biometrics theory, applications …, 2015 | 30 | 2015 |
Keystroke Biometric User Verification Using Hidden Markov Model ML Ali, K Thakur, CC Tappert, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 27 | 2016 |
Information Security Policy for E-Commerce in Saudi Arabia K Thakur, ML Ali, K Gai, M Qiu 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 22 | 2016 |
A hybrid method for keystroke biometric user identification ML Ali, K Thakur, MA Obaidat Electronics 11 (17), 2782, 2022 | 18 | 2022 |
Potential development on cyberattack and prospect analysis for cybersecurity L Li, K Thakur, ML Ali 2020 IEEE International IOT, Electronics and Mechatronics Conference …, 2020 | 15 | 2020 |
Pohmm/svm: A hybrid approach for keystroke biometric user authentication ML Ali, CC Tappert 2018 IEEE International Conference on Real-time Computing and Robotics (RCAR …, 2018 | 15 | 2018 |
Challenges of cyber security and the emerging trends ML Ali, K Thakur, B Atobatele Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019 | 13 | 2019 |
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur 2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022 | 12 | 2022 |
An analysis of information security event managers K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 12 | 2016 |
An Analysis of Information Security Event Managers K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 12 | 2016 |
Applications of cryptography in database: a review H Xu, K Thakur, AS Kamruzzaman, ML Ali 2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021 | 9 | 2021 |
Connectivity, Traffic Flow and Applied Statistics in Cyber Security K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao 2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016 | 9 | 2016 |
User Authentication and Identification using Neural Network ML Ali, CC Tappert, M Qiu, JV Monaco Journal On Pattern Recognition(JPR) 2 (2), 28-39, 2015 | 9 | 2015 |
Biometric studies with hidden Markov model and its extension on short fixed-text input B studies with hidden Markov model and its extension on short fixed-text ... 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017 | 8 | 2017 |
Cloud computing and its security issues K Thakur, L Tao, T Wang, ML Ali Application and Theory of Computer Technology 2 (1), 1-10, 2017 | 8 | 2017 |