An investigation on cyber security threats and security models K Thakur, M Qiu, K Gai, ML Ali 2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015 | 252 | 2015 |
2D-human face recognition using SIFT and SURF descriptors of face’s feature regions S Gupta, K Thakur, M Kumar The Visual Computer 37 (3), 447-456, 2021 | 234 | 2021 |
MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review G Kumar, K Thakur, MR Ayyagari The Journal of Supercomputing, 1-34, 2020 | 215 | 2020 |
Innovations of phishing defense: The mechanism, measurement and defense strategies K Thakur, J Shan, ASK Pathan International Journal of Communication Networks and Information Security 10 …, 2018 | 199 | 2018 |
Analysis of denial of services (DOS) attacks and prevention techniques K Thakur International journal of engineering research and technology 4, 2015 | 184 | 2015 |
Cybersecurity fundamentals: a real-world perspective K Thakur, ASK Pathan CRC Press, 2020 | 157 | 2020 |
An Analysis of AI-based Supervised Classifiers for Intrusion Detection in Big Data G Kumar, K Thakur Big Data Analytics, 26-46, 2018 | 153 | 2018 |
Nature inspired techniques and applications in intrusion detection systems: Recent progress and updated perspective K Thakur, G Kumar Archives of Computational Methods in Engineering 28 (4), 2897-2919, 2021 | 129 | 2021 |
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic W Lo, H Alqahtani, K Thakur, A Almadhor, S Chander, G Kumar Vehicular Communications 35, 100471, 2022 | 126 | 2022 |
An intelligent algorithmically generated domain detection system K Thakur, H Alqahtani, G Kumar Computers & Electrical Engineering 92, 107129, 2021 | 122 | 2021 |
Cyber security in social media: challenges and the way forward K Thakur, T Hayajneh, J Tseng IT Professional 21 (2), 41-49, 2019 | 111 | 2019 |
Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM S Dargan, M Kumar, A Garg, K Thakur Soft Computing, 1-12, 2019 | 109 | 2019 |
Cloud computing and its security issues K Thakur, L Tao, T Wang, ML Ali Application and Theory of Computer Technology 2 (1), 1-10, 2017 | 92 | 2017 |
Securing Mobile Devices and Technology K Thakur, ASK Pathan CRC Press, 2021 | 81 | 2021 |
An analysis of information security event managers K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 74 | 2016 |
Impact of cyber-attacks on critical infrastructure K Thakur, ML Ali, N Jiang, M Qiu 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 71 | 2016 |
Policy of Least Privilege and Segregation of Duties their Deployment Application & Effectiveness JC Brickley, K Thakur International Journal of Cyber-Security and Digital Forensics 10 (1), 112-119, 2021 | 64 | 2021 |
Keystroke biometric user verification using Hidden Markov Model ML Ali, K Thakur, CC Tappert, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 60 | 2016 |
A systematic review on deep-learning-based phishing email detection K Thakur, ML Ali, MA Obaidat, A Kamruzzaman Electronics 12 (21), 4545, 2023 | 55 | 2023 |
A hybrid method for keystroke biometric user identification ML Ali, K Thakur, MA Obaidat Electronics 11 (17), 2782, 2022 | 54 | 2022 |