Follow
Md Liakat ali
Md Liakat ali
Assistant Professor, Rider University, NJ
Verified email at rider.edu
Title
Cited by
Cited by
Year
An investigation on cyber security threats and security models
K Thakur, M Qiu, K Gai, ML Ali
2015 IEEE 2nd international conference on cyber security and cloud computing …, 2015
1612015
Security threats in mobile ad hoc network
K Biswas, ML Ali
1582007
Keystroke biometric systems for user authentication
ML Ali, JV Monaco, CC Tappert, M Qiu
Journal of Signal Processing Systems 86, 175-190, 2017
1372017
Impact Of Cyber-Attacks On Critical Infrastructure
K Thakur, ML Ali, N Jiang, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
512016
Authentication and Identification Methods Used in Keystroke Biometric Systems
ML Ali, CC Tappert, M Qiu, JV Monaco
2015 IEEE International Symposium on Big Data Security on Cloud …, 2015
332015
Spoofing key-press latencies with a generative keystroke dynamics model
JV Monaco, ML Ali, CC Tappert
2015 IEEE 7th international conference on biometrics theory, applications …, 2015
302015
Keystroke Biometric User Verification Using Hidden Markov Model
ML Ali, K Thakur, CC Tappert, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
272016
Information Security Policy for E-Commerce in Saudi Arabia
K Thakur, ML Ali, K Gai, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
222016
A hybrid method for keystroke biometric user identification
ML Ali, K Thakur, MA Obaidat
Electronics 11 (17), 2782, 2022
182022
Potential development on cyberattack and prospect analysis for cybersecurity
L Li, K Thakur, ML Ali
2020 IEEE International IOT, Electronics and Mechatronics Conference …, 2020
152020
Pohmm/svm: A hybrid approach for keystroke biometric user authentication
ML Ali, CC Tappert
2018 IEEE International Conference on Real-time Computing and Robotics (RCAR …, 2018
152018
Challenges of cyber security and the emerging trends
ML Ali, K Thakur, B Atobatele
Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019
132019
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet
A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur
2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022
122022
An analysis of information security event managers
K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
122016
An Analysis of Information Security Event Managers
K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
122016
Applications of cryptography in database: a review
H Xu, K Thakur, AS Kamruzzaman, ML Ali
2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021
92021
Connectivity, Traffic Flow and Applied Statistics in Cyber Security
K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao
2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016
92016
User Authentication and Identification using Neural Network
ML Ali, CC Tappert, M Qiu, JV Monaco
Journal On Pattern Recognition(JPR) 2 (2), 28-39, 2015
92015
Biometric studies with hidden Markov model and its extension on short fixed-text input
B studies with hidden Markov model and its extension on short fixed-text ...
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
82017
Cloud computing and its security issues
K Thakur, L Tao, T Wang, ML Ali
Application and Theory of Computer Technology 2 (1), 1-10, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20