Follow
Dr. Abu Kamruzzaman
Dr. Abu Kamruzzaman
Assistant Professor of Cybersecurity, AI and Informatics/Information Systems
Verified email at YORK.CUNY.EDU - Homepage
Title
Cited by
Cited by
Year
Quantum deep learning neural networks
A Kamruzzaman, Y Alhwaiti, A Leider, CC Tappert
Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020
222020
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet
A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur
2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022
122022
Applications of cryptography in database: a review
H Xu, K Thakur, AS Kamruzzaman, ML Ali
2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021
112021
Developing a deep learning model to implement rosenblatt’s experiential memory brain model
A Kamruzzaman, Y Alhwaiti, CC Tappert
Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020
102020
Connectivity, Traffic Flow and Applied Statistics in Cyber Security
K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao
2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016
92016
Social engineering incidents and preventions
A Kamruzzaman, K Thakur, S Ismat, ML Ali, K Huang, HN Thakur
2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023
62023
Applications of Cryptography in Database: A Review. In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)(pp. 1-6)
H Xu, K Thakur, A Kamruzzaman, M Ali
IEEE, April, 2021
62021
A computer science perspective on models of the mind
TN Brooks, A Kamruzzaman, A Leider, CC Tappert
Intelligent Systems and Applications: Proceedings of the 2018 Intelligent …, 2019
62019
Network packet sniffing and defense
ML Ali, S Ismat, K Thakur, A Kamruzzaman, Z Lue, HN Thakur
2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023
52023
A comprehensive review of endpoint security: Threats and defenses
A Kamruzzaman, S Ismat, JC Brickley, A Liu, K Thakur
2022 International Conference on Cyber Warfare and Security (ICCWS), 1-7, 2022
42022
A Comparative Analysis between Technical and Non-Technical Phishing Defences
JC Brickley, K Thakur, AS Kamruzzaman, NY Pleasantville
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 10 (1 …, 2021
42021
Developing Deep Learning Models to Simulate Human Declarative Episodic Memory Storage
A Kamruzzaman, CC Tappert
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
42019
A Systematic Review on Deep-Learning-Based Phishing Email Detection
K Thakur, ML Ali, MA Obaidat, A Kamruzzaman
Electronics 12 (21), 4545, 2023
32023
A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols
K Thakur, A Kamruzzaman, ASK Pathan
CRC Press, 2022
22022
A Comparative Study of Convolutional Neural Network Models with Rosenblatt’s Brain Model
A Kamruzzaman, A Khatri, MI Damiano Mastrandrea, P Shelke, Y Alhwaiti, ...
22018
A Comprehensive Review of Wireless Security Protocols and Encryption Applications
HN Thakur, A Al Hayajneh, K Thakur, A Kamruzzaman, ML Ali
2023 IEEE World AI IoT Congress (AIIoT), 0373-0379, 2023
12023
Analysis of a Parameter-Based Computational Model of Long-Term Declarative Episodic Memory
Y Alhwaiti, MZ Chowdhury, A Kamruzzaman, CC Tappert
2019 International Conference on Computational Science and Computational …, 2019
12019
One-Shot Deep Learning Models of Long-Term Declarative Episodic Memory
Y Alhawaiti, MZ Chowdhury, A Kamruzzaman, CC Tappert
12019
A Deep Learning Model for Long-term Declarative Episodic Memory Storage
A Kamruzzaman, T Brooks, K Thakkar, A Markale, S Rajwade, S Ahamed, ...
12018
Cuttlefish: A Library For Building Elastic Distributed Neural Networks
TN Brooks, R Almajalid, Y Hou, A Kamruzzaman, NY Pleasantville
Proceedings of Student-Faculty Research Day, CSIS, C3-1, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20