Kutub Thakur

According to our database1, Kutub Thakur authored at least 24 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dynamic routing approach for enhancing source location privacy in wireless sensor networks.
Wirel. Networks, 2023

Social Engineering Incidents and Preventions.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

Network Packet Sniffing and Defense.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

A Comprehensive Review of Wireless Security Protocols and Encryption Applications.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

Emerging ICT Technologies and Cybersecurity - From AI and ML to Other Futuristic Technologies
Springer, ISBN: 978-3-031-27764-1, 2023

2022
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic.
Veh. Commun., 2022

A Secure Authentication and Access Control Scheme for CoAP-based IoT.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

2021
2D-human face recognition using SIFT and SURF descriptors of face's feature regions.
Vis. Comput., 2021

An intelligent algorithmically generated domain detection system.
Comput. Electr. Eng., 2021

Top Reported Data Security Risks in the Age of COVID-19.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

2020
MLEsIDSs: machine learning-based ensembles for intrusion detection systems - a review.
J. Supercomput., 2020

Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM.
Soft Comput., 2020

2019
Cyber Security in Social Media: Challenges and the Way Forward.
IT Prof., 2019

Challenges of Cyber Security and the Emerging Trends.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies.
Int. J. Commun. Networks Inf. Secur., 2018

2016
Connectivity, Traffic Flow and Applied Statistics in Cyber Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

An Analysis of Information Security Event Managers.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Keystroke Biometric User Verification Using Hidden Markov Model.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Impact of Cyber-Attacks on Critical Infrastructure.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Information Security Policy for E-Commerce in Saudi Arabia.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
An Investigation on Cyber Security Threats and Security Models.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

An Approach to Minimize Crossings in Phylogenetic Trees.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015


  Loading...