default search action
Kutub Thakur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Md Liakat Ali, Kutub Thakur, Helen Barker, Michael Chan:
The Rise of Artificial Intelligence: Industry Insights and Applications in Security Information and Event Management (SIEM). UEMCON 2024: 477-482 - 2023
- [b1]Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat:
Emerging ICT Technologies and Cybersecurity - From AI and ML to Other Futuristic Technologies. Springer 2023, ISBN 978-3-031-27764-1, pp. 1-269 - [j8]Gulshan Kumar, Rajkumar Singh Rathore, Kutub Thakur, Ahmad S. Almadhor, Sardar Asad Ali Biabani, Subhash Chander:
Dynamic routing approach for enhancing source location privacy in wireless sensor networks. Wirel. Networks 29(6): 2591-2607 (2023) - [c15]Hasnain Nizam Thakur, Abdullah Al Hayajneh, Kutub Thakur, Abu Kamruzzaman, Md Liakat Ali:
A Comprehensive Review of Wireless Security Protocols and Encryption Applications. AIIoT 2023: 373-379 - [c14]Abu Kamruzzaman, Kutub Thakur, Sadia Ismat, Md Liakat Ali, Kevin Huang, Hasnain Nizam Thakur:
Social Engineering Incidents and Preventions. CCWC 2023: 494-498 - [c13]Md Liakat Ali, Sadia Ismat, Kutub Thakur, Abu Kamruzzaman, Zijie Lue, Hasnain Nizam Thakur:
Network Packet Sniffing and Defense. CCWC 2023: 499-503 - 2022
- [j7]Wei Lo, Hamed AlQahtani, Kutub Thakur, Ahmad S. Almadhor, Subhash Chander, Gulshan Kumar:
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic. Veh. Commun. 35: 100471 (2022) - [c12]Adam Borys, Abu Kamruzzaman, Hasnain Nizam Thakur, Joseph C. Brickley, Md Liakat Ali, Kutub Thakur:
An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet. AIIoT 2022: 725-729 - [c11]Thomas F. Watson, Kutub Thakur, Md Liakat Ali:
The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study. CCWC 2022: 709-715 - [c10]Muath A. Obaidat, Jian Lim Choong, Kutub Thakur:
A Secure Authentication and Access Control Scheme for CoAP-based IoT. CIoT 2022: 145-149 - 2021
- [j6]Kutub Thakur, Hamed AlQahtani, Gulshan Kumar:
An intelligent algorithmically generated domain detection system. Comput. Electr. Eng. 92: 107129 (2021) - [j5]Surbhi Gupta, Kutub Thakur, Munish Kumar:
2D-human face recognition using SIFT and SURF descriptors of face's feature regions. Vis. Comput. 37(3): 447-456 (2021) - [c9]Suzanna Schmeelk, Kutub Thakur, Md Liakat Ali, Denise M. Dragos, Abdullah Alhayajneh, Bryan Rendra Pramana:
Top Reported Data Security Risks in the Age of COVID-19. UEMCON 2021: 204-208 - 2020
- [j4]Shaveta Dargan, Munish Kumar, Anupam Garg, Kutub Thakur:
Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM. Soft Comput. 24(13): 10111-10122 (2020) - [j3]Gulshan Kumar, Kutub Thakur, Maruthi Rohit Ayyagari:
MLEsIDSs: machine learning-based ensembles for intrusion detection systems - a review. J. Supercomput. 76(11): 8938-8971 (2020)
2010 – 2019
- 2019
- [j2]Kutub Thakur, Thaier Hayajneh, Jason Tseng:
Cyber Security in Social Media: Challenges and the Way Forward. IT Prof. 21(2): 41-49 (2019) - [c8]Md Liakat Ali, Kutub Thakur, Beatrice Atobatele:
Challenges of Cyber Security and the Emerging Trends. BSCI 2019: 107-112 - 2018
- [j1]Kutub Thakur, Juan Shan, Al-Sakib Khan Pathan:
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - 2016
- [c7]Kutub Thakur, Md Liakat Ali, Ning Jiang, Meikang Qiu:
Impact of Cyber-Attacks on Critical Infrastructure. BigDataSecurity/HPSC/IDS 2016: 183-186 - [c6]Kutub Thakur, Md Liakat Ali, Keke Gai, Meikang Qiu:
Information Security Policy for E-Commerce in Saudi Arabia. BigDataSecurity/HPSC/IDS 2016: 187-190 - [c5]Md Liakat Ali, Kutub Thakur, Charles C. Tappert, Meikang Qiu:
Keystroke Biometric User Verification Using Hidden Markov Model. CSCloud 2016: 204-209 - [c4]Kutub Thakur, Sandra Kopecky, Moath Nuseir, Md Liakat Ali, Meikang Qiu:
An Analysis of Information Security Event Managers. CSCloud 2016: 210-215 - [c3]Kutub Thakur, Md Liakat Ali, Sandra Kopecky, Abu Kamruzzaman, Lixin Tao:
Connectivity, Traffic Flow and Applied Statistics in Cyber Security. SmartCloud 2016: 295-300 - 2015
- [c2]Md Liakat Ali, Kutub Thakur, John V. Monaco, Meikang Qiu:
An Approach to Minimize Crossings in Phylogenetic Trees. CSCloud 2015: 42-47 - [c1]Kutub Thakur, Meikang Qiu, Keke Gai, Md Liakat Ali:
An Investigation on Cyber Security Threats and Security Models. CSCloud 2015: 307-311
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint