关注
Md Liakat Ali
Md Liakat Ali
Associate Professor, Rider University
在 rider.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An investigation on cyber security threats and security models
K Thakur, M Qiu, K Gai, ML Ali
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
2092015
Security threats in mobile ad hoc network
K Biswas, ML Ali
1582007
Keystroke biometric systems for user authentication
ML Ali, JV Monaco, CC Tappert, M Qiu
Journal of Signal Processing Systems 86, 175-190, 2017
1422017
Impact of cyber-attacks on critical infrastructure
K Thakur, ML Ali, N Jiang, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
562016
Authentication and identification methods used in keystroke biometric systems
ML Ali, CC Tappert, M Qiu, JV Monaco
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
332015
Spoofing key-press latencies with a generative keystroke dynamics model
JV Monaco, ML Ali, CC Tappert
2015 IEEE 7th international conference on biometrics theory, applications …, 2015
322015
Keystroke biometric user verification using Hidden Markov Model
ML Ali, K Thakur, CC Tappert, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
312016
Challenges of cyber security and the emerging trends
ML Ali, K Thakur, B Atobatele
Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019
232019
Information security policy for e-commerce in Saudi Arabia
K Thakur, ML Ali, K Gai, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
222016
A hybrid method for keystroke biometric user identification
ML Ali, K Thakur, MA Obaidat
Electronics 11 (17), 2782, 2022
202022
Potential development on cyberattack and prospect analysis for cybersecurity
L Li, K Thakur, ML Ali
2020 IEEE International IOT, Electronics and Mechatronics Conference …, 2020
162020
Pohmm/svm: A hybrid approach for keystroke biometric user authentication
ML Ali, CC Tappert
2018 IEEE International Conference on Real-time Computing and Robotics (RCAR …, 2018
152018
An analysis of information security event managers
K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
142016
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet
A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur
2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022
122022
Applications of cryptography in database: a review
H Xu, K Thakur, AS Kamruzzaman, ML Ali
2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021
112021
Connectivity, Traffic Flow and Applied Statistics in Cyber Security
K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao
2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016
92016
User authentication and identification using neural network
ML Ali, K Thakur, CC Tappert
i-manager's Journal on Pattern Recognition 2 (2), 34, 2015
92015
Social engineering incidents and preventions
A Kamruzzaman, K Thakur, S Ismat, ML Ali, K Huang, HN Thakur
2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023
82023
Biometric studies with hidden Markov model and its extension on short fixed-text input
ML Ali, JV Monaco, CC Tappert
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
82017
Cloud computing and its security issues
K Thakur, L Tao, T Wang, ML Ali
Application and Theory of Computer Technology 2 (1), 1-10, 2017
82017
系统目前无法执行此操作,请稍后再试。
文章 1–20