متابعة
Dr. Kutub Thakur
Dr. Kutub Thakur
Phd Computer Science , Pace University
بريد إلكتروني تم التحقق منه على pace.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
An investigation on cyber security threats and security models
K Thakur, M Qiu, K Gai, ML Ali
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
2522015
2D-human face recognition using SIFT and SURF descriptors of face’s feature regions
S Gupta, K Thakur, M Kumar
The Visual Computer 37 (3), 447-456, 2021
2342021
MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
G Kumar, K Thakur, MR Ayyagari
The Journal of Supercomputing, 1-34, 2020
2152020
Innovations of phishing defense: The mechanism, measurement and defense strategies
K Thakur, J Shan, ASK Pathan
International Journal of Communication Networks and Information Security 10 …, 2018
1992018
Analysis of denial of services (DOS) attacks and prevention techniques
K Thakur
International journal of engineering research and technology 4, 2015
1842015
Cybersecurity fundamentals: a real-world perspective
K Thakur, ASK Pathan
CRC Press, 2020
1572020
An Analysis of AI-based Supervised Classifiers for Intrusion Detection in Big Data
G Kumar, K Thakur
Big Data Analytics, 26-46, 2018
1532018
Nature inspired techniques and applications in intrusion detection systems: Recent progress and updated perspective
K Thakur, G Kumar
Archives of Computational Methods in Engineering 28 (4), 2897-2919, 2021
1292021
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic
W Lo, H Alqahtani, K Thakur, A Almadhor, S Chander, G Kumar
Vehicular Communications 35, 100471, 2022
1262022
An intelligent algorithmically generated domain detection system
K Thakur, H Alqahtani, G Kumar
Computers & Electrical Engineering 92, 107129, 2021
1222021
Cyber security in social media: challenges and the way forward
K Thakur, T Hayajneh, J Tseng
IT Professional 21 (2), 41-49, 2019
1112019
Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM
S Dargan, M Kumar, A Garg, K Thakur
Soft Computing, 1-12, 2019
1092019
Cloud computing and its security issues
K Thakur, L Tao, T Wang, ML Ali
Application and Theory of Computer Technology 2 (1), 1-10, 2017
922017
Securing Mobile Devices and Technology
K Thakur, ASK Pathan
CRC Press, 2021
812021
An analysis of information security event managers
K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
742016
Impact of cyber-attacks on critical infrastructure
K Thakur, ML Ali, N Jiang, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
712016
Policy of Least Privilege and Segregation of Duties their Deployment Application & Effectiveness
JC Brickley, K Thakur
International Journal of Cyber-Security and Digital Forensics 10 (1), 112-119, 2021
642021
Keystroke biometric user verification using Hidden Markov Model
ML Ali, K Thakur, CC Tappert, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
602016
A systematic review on deep-learning-based phishing email detection
K Thakur, ML Ali, MA Obaidat, A Kamruzzaman
Electronics 12 (21), 4545, 2023
552023
A hybrid method for keystroke biometric user identification
ML Ali, K Thakur, MA Obaidat
Electronics 11 (17), 2782, 2022
542022
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20