Research
Senior Research Fellow: Dr. Al-Sakib Khan Pathan - IEEE Senior Member, United International University, Bangladesh
Cybersecurity Research
-
Thakur, K., & Kumar, G. (2020). Nature Inspired Techniques and Applications in Intrusion Detection Systems: Recent Progress and Updated Perspective. Archives of Computational Methods in Engineering, 1-23.
-
Thakur, K., Shan, J., & Pathan, A. S. K. (2018). Innovations of phishing defense: The mechanism, measurement and defense strategies. International Journal of Communication Networks and Information Security, 10(1), 19-27.
-
Ali, M. L., Thakur, K., & Tappert, C. C. (2015). User authentication and identification using neural network. i-manager's Journal on Pattern Recognition, 2(2), 34.
-
Thakur, K., Hayajneh, T., & Tseng, J. (2019). Cyber security in social media: challenges and the way forward. IT Professional, 21(2), 41-49.
-
Ali, M. L., Thakur, K., Tappert, C. C., & Qiu, M. (2016, June). Keystroke biometric user verification using hidden Markov model. In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 204-209). IEEE.
-
P Bhattacharya, K Thakur, J Tseng, A Alhayajneh “Malicious Software Types and Counter Measures” Journal of Advanced Research in Dynamical and Control Systems, Pages 439-451
-
K Thakur, J Tseng, S Blende “Cyber Security Enforcement in the Internet of Things: Present and Future Perspective” Journal of Advanced Research in Dynamical and Control Systems, Pages 88-92
-
Thakur, K., Tao, L., Wang, T., & Ali, M. L. (2017). Cloud Computing and its Security Issues. Application and Theory of Computer Technology, 2(1), 1-10.
-
Thakur, K., Ali, M. L., Jiang, N., & Qiu, M. (2016, April). Impact of cyber-attacks on critical infrastructure. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 183-186). IEEE.
-
Obaidat, M. A., Obeidat, S., Holst, J., Al Hayajneh, A., & Brown, J. (2020). A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures. Computers, 9(2), 44.
-
Obaidat, M., Brown, J., Al Hayajneh, A. Web Browser Extension User-Script XSS Vulnerabilities. Report of the 2020 IEEE Cyber Science and Technology Congress Conference. Canada, 2020.
-
Gupta, S., Thakur, K., & Kumar, M. (2020). 2D-human face recognition using SIFT and SURF descriptors of face’s feature regions. The Visual Computer, 1-10.
-
Kumar, G., Thakur, K., & Ayyagari, M. R. (2020). MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review. The Journal of Supercomputing, 1-34.
-
Dargan, S., Kumar, M., Garg, A., & Thakur, K. (2019). Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM. Soft Computing, 1-12.
-
Li, L., Thakur, K., & Ali, M. L. (2020, September). Potential Development on Cyberattack and Prospect Analysis for Cybersecurity. In 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (pp. 1-6). IEEE.
-
Gorbach, V., Ali, M. L., & Thakur, K. (2020, September). A Review of Data Privacy Techniques for Wireless Body Area Networks in Telemedicine. In 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (pp. 1-6). IEEE.
Books (Authored Volumes)
03. Kutub Thakur, Abu Kamruzzaman, and Al-Sakib Khan Pathan, A Deeper Perspective on the Fundamentals of Digital Communication, Security, Privacy Protocols. (authored volume), eBook ISBN 9781003300908, CRC Press, Taylor & Francis, USA, 2022.
02. Kutub Thakur and Al-Sakib Khan Pathan. Securing Mobile Devices and Technology. (authored volume), ISBN 9781032136127, CRC Press, Taylor & Francis, USA, 2022.
01. Kutub Thakur and Al-Sakib Khan Pathan. Cybersecurity Fundamentals: A Real World Perspective. (authored volume), ISBN-13: 978-0367476489, CRC Press, USA, May 2020.