Quantum deep learning neural networks A Kamruzzaman, Y Alhwaiti, A Leider, CC Tappert Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020 | 22 | 2020 |
An evaluation of IoT DDoS cryptojacking malware and Mirai botnet A Borys, A Kamruzzaman, HN Thakur, JC Brickley, ML Ali, K Thakur 2022 IEEE World AI IoT Congress (AIIoT), 725-729, 2022 | 12 | 2022 |
Applications of cryptography in database: a review H Xu, K Thakur, AS Kamruzzaman, ML Ali 2021 IEEE International IOT, Electronics and Mechatronics Conference …, 2021 | 11 | 2021 |
Developing a deep learning model to implement rosenblatt’s experiential memory brain model A Kamruzzaman, Y Alhwaiti, CC Tappert Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020 | 10 | 2020 |
Connectivity, Traffic Flow and Applied Statistics in Cyber Security K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao 2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016 | 9 | 2016 |
Social engineering incidents and preventions A Kamruzzaman, K Thakur, S Ismat, ML Ali, K Huang, HN Thakur 2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023 | 6 | 2023 |
Applications of Cryptography in Database: A Review. In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)(pp. 1-6) H Xu, K Thakur, A Kamruzzaman, M Ali IEEE, April, 2021 | 6 | 2021 |
A computer science perspective on models of the mind TN Brooks, A Kamruzzaman, A Leider, CC Tappert Intelligent Systems and Applications: Proceedings of the 2018 Intelligent …, 2019 | 6 | 2019 |
Network packet sniffing and defense ML Ali, S Ismat, K Thakur, A Kamruzzaman, Z Lue, HN Thakur 2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023 | 5 | 2023 |
A comprehensive review of endpoint security: Threats and defenses A Kamruzzaman, S Ismat, JC Brickley, A Liu, K Thakur 2022 International Conference on Cyber Warfare and Security (ICCWS), 1-7, 2022 | 4 | 2022 |
A Comparative Analysis between Technical and Non-Technical Phishing Defences JC Brickley, K Thakur, AS Kamruzzaman, NY Pleasantville International Journal of Cyber-Security and Digital Forensics (IJCSDF) 10 (1 …, 2021 | 4 | 2021 |
Developing Deep Learning Models to Simulate Human Declarative Episodic Memory Storage A Kamruzzaman, CC Tappert International Journal of Advanced Computer Science and Applications (IJACSA …, 2019 | 4 | 2019 |
A Systematic Review on Deep-Learning-Based Phishing Email Detection K Thakur, ML Ali, MA Obaidat, A Kamruzzaman Electronics 12 (21), 4545, 2023 | 3 | 2023 |
A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols K Thakur, A Kamruzzaman, ASK Pathan CRC Press, 2022 | 2 | 2022 |
A Comparative Study of Convolutional Neural Network Models with Rosenblatt’s Brain Model A Kamruzzaman, A Khatri, MI Damiano Mastrandrea, P Shelke, Y Alhwaiti, ... | 2 | 2018 |
A Comprehensive Review of Wireless Security Protocols and Encryption Applications HN Thakur, A Al Hayajneh, K Thakur, A Kamruzzaman, ML Ali 2023 IEEE World AI IoT Congress (AIIoT), 0373-0379, 2023 | 1 | 2023 |
Analysis of a Parameter-Based Computational Model of Long-Term Declarative Episodic Memory Y Alhwaiti, MZ Chowdhury, A Kamruzzaman, CC Tappert 2019 International Conference on Computational Science and Computational …, 2019 | 1 | 2019 |
One-Shot Deep Learning Models of Long-Term Declarative Episodic Memory Y Alhawaiti, MZ Chowdhury, A Kamruzzaman, CC Tappert | 1 | 2019 |
A Deep Learning Model for Long-term Declarative Episodic Memory Storage A Kamruzzaman, T Brooks, K Thakkar, A Markale, S Rajwade, S Ahamed, ... | 1 | 2018 |
Cuttlefish: A Library For Building Elastic Distributed Neural Networks TN Brooks, R Almajalid, Y Hou, A Kamruzzaman, NY Pleasantville Proceedings of Student-Faculty Research Day, CSIS, C3-1, 2017 | 1 | 2017 |