default search action
Md Liakat Ali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Amanda Zambrana, Loreen Fanek, Pablo Salar Carrera, Md Liakat Ali, Mourya Reddy Narasareddygari:
Machine Learning Algorithms for Diabetes Diagnosis Prediction. IVSP 2024: 192-199 - [c27]Md Liakat Ali, Kutub Thakur, Helen Barker, Michael Chan:
The Rise of Artificial Intelligence: Industry Insights and Applications in Security Information and Event Management (SIEM). UEMCON 2024: 477-482 - 2023
- [c26]Samantha Haines, Eric Eaton, Md Liakat Ali:
Machine Learning Models for Histopathological Breast Cancer Image Classification. AIIoT 2023: 36-41 - [c25]Hasnain Nizam Thakur, Abdullah Al Hayajneh, Kutub Thakur, Abu Kamruzzaman, Md Liakat Ali:
A Comprehensive Review of Wireless Security Protocols and Encryption Applications. AIIoT 2023: 373-379 - [c24]Md Liakat Ali, Chris Keller, Michael Huang:
Fruits Detections Using Single Shot MultiBox Detector. BSCI 2023: 140-144 - [c23]Abu Kamruzzaman, Kutub Thakur, Sadia Ismat, Md Liakat Ali, Kevin Huang, Hasnain Nizam Thakur:
Social Engineering Incidents and Preventions. CCWC 2023: 494-498 - [c22]Md Liakat Ali, Sadia Ismat, Kutub Thakur, Abu Kamruzzaman, Zijie Lue, Hasnain Nizam Thakur:
Network Packet Sniffing and Defense. CCWC 2023: 499-503 - [c21]Md Liakat Ali, Meikang Qiu, Suzanna Schmeelk:
Access Control, Biometrics, and the Future. IVSP 2023: 10-17 - 2022
- [c20]Adam Borys, Abu Kamruzzaman, Hasnain Nizam Thakur, Joseph C. Brickley, Md Liakat Ali, Kutub Thakur:
An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet. AIIoT 2022: 725-729 - [c19]Thomas F. Watson, Kutub Thakur, Md Liakat Ali:
The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study. CCWC 2022: 709-715 - 2021
- [c18]Suzanna Schmeelk, Kutub Thakur, Md Liakat Ali, Denise M. Dragos, Abdullah Alhayajneh, Bryan Rendra Pramana:
Top Reported Data Security Risks in the Age of COVID-19. UEMCON 2021: 204-208 - 2020
- [j2]Jing Zhou, Jianfeng Zhou, Heng Ye, Md Liakat Ali, Henry T. Nguyen, Pengyin Chen:
Classification of soybean leaf wilting due to drought stress using UAV-based imagery. Comput. Electron. Agric. 175: 105576 (2020) - [c17]Adam Asadoorian, Melvin Alberto, Md Liakat Ali:
Creating and Using Secure Software. UEMCON 2020: 786-792 - [c16]Wenyun Dai, Longbin Chen, Ana Wu, Md Liakat Ali:
DASC: A Privacy-Protected Data Access System with Cache Mechanism for Smartphones. WOCC 2020: 1-6
2010 – 2019
- 2019
- [c15]Md Liakat Ali, Kutub Thakur, Beatrice Atobatele:
Challenges of Cyber Security and the Emerging Trends. BSCI 2019: 107-112 - [c14]Joseph L. Fracasso, Md Liakat Ali:
Applications of Machine Learning Tools in Genomics: A Review. SmartCom 2019: 330-340 - [c13]Maxwell Ruggieri, Tzu-Tang Hsu, Md Liakat Ali:
Security Considerations for the Development of Secure Software Systems. UEMCON 2019: 1187-1193 - 2018
- [c12]Md Liakat Ali, Charles C. Tappert:
POHMM/SVM: A Hybrid Approach for Keystroke Biometric User Authentication. RCAR 2018: 612-617 - [c11]Jonathan Herrera, Md Liakat Ali:
Concerns and Security for Hashing Passwords. UEMCON 2018: 861-865 - 2017
- [j1]Md Liakat Ali, John V. Monaco, Charles C. Tappert, Meikang Qiu:
Keystroke Biometric Systems for User Authentication. J. Signal Process. Syst. 86(2-3): 175-190 (2017) - [c10]Md Liakat Ali, John V. Monaco, Charles C. Tappert:
Biometric studies with hidden Markov model and its extension on short fixed-text input. UEMCON 2017: 258-264 - 2016
- [c9]Kutub Thakur, Md Liakat Ali, Ning Jiang, Meikang Qiu:
Impact of Cyber-Attacks on Critical Infrastructure. BigDataSecurity/HPSC/IDS 2016: 183-186 - [c8]Kutub Thakur, Md Liakat Ali, Keke Gai, Meikang Qiu:
Information Security Policy for E-Commerce in Saudi Arabia. BigDataSecurity/HPSC/IDS 2016: 187-190 - [c7]Md Liakat Ali, Kutub Thakur, Charles C. Tappert, Meikang Qiu:
Keystroke Biometric User Verification Using Hidden Markov Model. CSCloud 2016: 204-209 - [c6]Kutub Thakur, Sandra Kopecky, Moath Nuseir, Md Liakat Ali, Meikang Qiu:
An Analysis of Information Security Event Managers. CSCloud 2016: 210-215 - [c5]Kutub Thakur, Md Liakat Ali, Sandra Kopecky, Abu Kamruzzaman, Lixin Tao:
Connectivity, Traffic Flow and Applied Statistics in Cyber Security. SmartCloud 2016: 295-300 - 2015
- [c4]John V. Monaco, Md Liakat Ali, Charles C. Tappert:
Spoofing key-press latencies with a generative keystroke dynamics model. BTAS 2015: 1-8 - [c3]Md Liakat Ali, Kutub Thakur, John V. Monaco, Meikang Qiu:
An Approach to Minimize Crossings in Phylogenetic Trees. CSCloud 2015: 42-47 - [c2]Kutub Thakur, Meikang Qiu, Keke Gai, Md Liakat Ali:
An Investigation on Cyber Security Threats and Security Models. CSCloud 2015: 307-311 - [c1]Md Liakat Ali, Charles C. Tappert, Meikang Qiu, John V. Monaco:
Authentication and Identification Methods Used in Keystroke Biometric Systems. HPCC/CSS/ICESS 2015: 1424-1429
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint