Krishan Kumar

Orcid: 0000-0001-9877-0238

Affiliations:
  • Panjab University, University Institute of Engineering and Technology, Chandigarh, India
  • Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab, India (former)
  • Punjab Technical University, Jalandhar, Punjab, India (former)


According to our database1, Krishan Kumar authored at least 61 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Handwriting-based gender classification using machine learning techniques.
Multim. Tools Appl., 2024

2023
Worddeepnet: handwritten gurumukhi word recognition using convolutional neural network.
Multim. Tools Appl., December, 2023

DL-2P-DDoSADF: Deep learning-based two-phase DDoS attack detection framework.
J. Inf. Secur. Appl., November, 2023

COVID-19: Social distancing monitoring using faster-RCNN and YOLOv3 algorithms.
Multim. Tools Appl., February, 2023

Bagging: An Ensemble Approach for Recognition of Handwritten Place Names in Gurumukhi Script.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2023

Deep learning approaches for detecting DDoS attacks: a systematic review.
Soft Comput., 2023

Unveiling digital image forgeries using Markov based quaternions in frequency domain and fusion of machine learning algorithms.
Multim. Tools Appl., 2023

2022
Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities.
Proceedings of the Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 2022

KS-DDoS: Kafka streams-based classification approach for DDoS attacks.
J. Supercomput., 2022

Using XAI for Deep Learning-Based Image Manipulation Detection with Shapley Additive Explanation.
Symmetry, 2022

An efficient approach for copy-move image forgery detection using convolution neural network.
Multim. Tools Appl., 2022

A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions.
Multim. Syst., 2022

E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks.
J. King Saud Univ. Comput. Inf. Sci., 2022

A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture.
Comput. Networks, 2022

SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks.
Clust. Comput., 2022

Towards an Open-Source NFV Management and Orchestration Framework.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
Intrusion detection techniques in network environment: a systematic review.
Wirel. Networks, 2021

An efficient technique for object recognition using Shi-Tomasi corner detection algorithm.
Soft Comput., 2021

Face mask detection using YOLOv3 and faster R-CNN models: COVID-19 environment.
Multim. Tools Appl., 2021

Gait recognition based on vision systems: A systematic survey.
J. Vis. Commun. Image Represent., 2021

D-FAC: A novel <i>ϕ</i>-Divergence based distributed DDoS defense system.
J. King Saud Univ. Comput. Inf. Sci., 2021

An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks.
J. Ambient Intell. Humaniz. Comput., 2021

Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions.
Concurr. Comput. Pract. Exp., 2021

A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions.
Comput. Secur., 2021

A review on P4-Programmable data planes: Architecture, research efforts, and future directions.
Comput. Commun., 2021

Fusion of Handcrafted and Deep Features for Forgery Detection in Digital Images.
IEEE Access, 2021

2020
S-DDoS: Apache spark based real-time DDoS detection system.
J. Intell. Fuzzy Syst., 2020

SPREADING OF COVID-19 IN INDIA, ITALY, JAPAN, SPAIN, UK, US: A Prediction Using ARIMA and LSTM Model.
Digit. Gov. Res. Pract., 2020

A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture.
Comput. Sci. Rev., 2020

2019
Characterization of splicing in digital images using gray scale co-occurrence matrices.
Proceedings of the 2019 Twelfth International Conference on Contemporary Computing, 2019

2018
User behavior analytics-based classification of application layer HTTP-GET flood attacks.
J. Netw. Comput. Appl., 2018

D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events.
J. Netw. Comput. Appl., 2018

A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics.
Turkish J. Electr. Eng. Comput. Sci., 2018

Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

2017
Churn handling strategies for structured overlay networks: A survey.
Multiagent Grid Syst., 2017

Overlay based defensive architecture to survive DDoS: A comparative study.
J. High Speed Networks, 2017

Load Balanced and Link Break Prediction Routing Protocol for Mobile Ad Hoc Networks.
J. Commun., 2017

Discriminating Flash Events from DDoS Attacks: A Comprehensive Review.
Int. J. Netw. Secur., 2017

Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review.
Int. J. Netw. Secur., 2017

Characterizing DDoS attacks and flash events: Review, research gaps and future directions.
Comput. Sci. Rev., 2017

Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges.
Comput. Secur., 2017

Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation.
Comput. Commun., 2017

Detection of DDoS attacks and flash events using novel information theory metrics.
Comput. Networks, 2017

2016
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation.
Secur. Commun. Networks, 2016

A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack.
J. Comput. Networks Commun., 2016

A comprehensive approach to discriminate DDoS attacks from flash events.
J. Inf. Secur. Appl., 2016

Cross layer weight based on demand routing protocol for mobile ad hoc networks.
Int. J. Commun. Networks Distributed Syst., 2016

A systematic review of IP traceback schemes for denial of service attacks.
Comput. Secur., 2016

Performance Analysis of Predictive Stabilization for Churn Handling in Structured Overlay Networks.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

2012
An information theoretic approach for feature selection.
Secur. Commun. Networks, 2012

QoS routing protocols for mobile ad hoc networks: a survey.
Int. J. Wirel. Mob. Comput., 2012

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
CoRR, 2012

The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review.
Appl. Comput. Intell. Soft Comput., 2012

2011
A novel evaluation function for feature selection based upon information theory.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

AI based supervised classifiers: an analysis for intrusion detection.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

2010
DDoS Incidents and their Impact: A Review.
Int. Arab J. Inf. Technol., 2010

The use of artificial intelligence based techniques for intrusion detection: a review.
Artif. Intell. Rev., 2010

2007
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...