Follow
Md Liakat ali
Md Liakat ali
Assistant Professor, Rider University, NJ
Verified email at rider.edu
Title
Cited by
Cited by
Year
Security threats in mobile ad hoc network
K Biswas, M Ali
1542007
An investigation on cyber security threats and security models
K Thakur, M Qiu, K Gai, ML Ali
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
1162015
Keystroke biometric systems for user authentication
ML Ali, JV Monaco, CC Tappert, M Qiu
Journal of Signal Processing Systems 86 (2), 175-190, 2017
1112017
Impact Of Cyber-Attacks On Critical Infrastructure
K Thakur, ML Ali, N Jiang, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
332016
Authentication and Identification Methods Used in Keystroke Biometric Systems
ML Ali, CC Tappert, M Qiu, JV Monaco
2015 IEEE International Symposium on Big Data Security on Cloud …, 2015
302015
Spoofing key-press latencies with a generative keystroke dynamics model
JV Monaco, ML Ali, CC Tappert
2015 IEEE 7th international conference on biometrics theory, applications …, 2015
242015
Keystroke Biometric User Verification Using Hidden Markov Model
ML Ali, K Thakur, CC Tappert, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
222016
Information Security Policy for E-Commerce in Saudi Arabia
K Thakur, ML Ali, K Gai, M Qiu
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
132016
An analysis of information security event managers
K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
112016
An Analysis of Information Security Event Managers
K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
112016
Pohmm/svm: A hybrid approach for keystroke biometric user authentication
ML Ali, CC Tappert
2018 IEEE International Conference on Real-time Computing and Robotics (RCAR …, 2018
102018
User Authentication and Identification using Neural Network
ML Ali, CC Tappert, M Qiu, JV Monaco
Journal On Pattern Recognition(JPR) 2 (2), 28-39, 2015
82015
Challenges of cyber security and the emerging trends
ML Ali, K Thakur, B Atobatele
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure …, 2019
72019
Connectivity, Traffic Flow and Applied Statistics in Cyber Security
K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao
2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016
72016
Biometric studies with hidden Markov model and its extension on short fixed-text input
B studies with hidden Markov model and its extension on short fixed-text ...
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
62017
Hidden markov models in keystroke dynamics
ML Ali, J Monaco, C Tappert
Proceedings of student-faculty research day 1, 2015
62015
Potential development on cyberattack and prospect analysis for cybersecurity
L Li, K Thakur, ML Ali
2020 IEEE International IOT, Electronics and Mechatronics Conference …, 2020
52020
A Review of Data Privacy Techniques for Wireless Body Area Networks in Telemedicine. In 2020 IEEE International IoT, Electronics and Mechatronics Conference (IEMTRONICS)(pp. 1-6)
V Gorbach, ML Ali, K Thakur
IEEE, 2020
52020
Security Considerations for the Development of Secure Software Systems
M Ruggieri, TT Hsu, ML Ali
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019
52019
Applications of Cryptography in Database: A Review
H Xu, K Thakur, AS Kamruzzaman, ML Ali
2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20