Krishan Kumar
Orcid: 0000-0001-9877-0238Affiliations:
- Panjab University, University Institute of Engineering and Technology, Chandigarh, India
- Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab, India (former)
- Punjab Technical University, Jalandhar, Punjab, India (former)
According to our database1,
Krishan Kumar
authored at least 63 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Evol. Syst., August, 2024
Multim. Tools Appl., May, 2024
Multim. Tools Appl., 2024
2023
Worddeepnet: handwritten gurumukhi word recognition using convolutional neural network.
Multim. Tools Appl., December, 2023
J. Inf. Secur. Appl., November, 2023
Multim. Tools Appl., February, 2023
Bagging: An Ensemble Approach for Recognition of Handwritten Place Names in Gurumukhi Script.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2023
Soft Comput., 2023
Unveiling digital image forgeries using Markov based quaternions in frequency domain and fusion of machine learning algorithms.
Multim. Tools Appl., 2023
2022
Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities.
Proceedings of the Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 2022
J. Supercomput., 2022
Using XAI for Deep Learning-Based Image Manipulation Detection with Shapley Additive Explanation.
Symmetry, 2022
An efficient approach for copy-move image forgery detection using convolution neural network.
Multim. Tools Appl., 2022
A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions.
Multim. Syst., 2022
E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks.
J. King Saud Univ. Comput. Inf. Sci., 2022
A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture.
Comput. Networks, 2022
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks.
Clust. Comput., 2022
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022
2021
Wirel. Networks, 2021
An efficient technique for object recognition using Shi-Tomasi corner detection algorithm.
Soft Comput., 2021
Multim. Tools Appl., 2021
J. Vis. Commun. Image Represent., 2021
J. King Saud Univ. Comput. Inf. Sci., 2021
An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks.
J. Ambient Intell. Humaniz. Comput., 2021
Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions.
Concurr. Comput. Pract. Exp., 2021
A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions.
Comput. Secur., 2021
A review on P4-Programmable data planes: Architecture, research efforts, and future directions.
Comput. Commun., 2021
IEEE Access, 2021
2020
J. Intell. Fuzzy Syst., 2020
SPREADING OF COVID-19 IN INDIA, ITALY, JAPAN, SPAIN, UK, US: A Prediction Using ARIMA and LSTM Model.
Digit. Gov. Res. Pract., 2020
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture.
Comput. Sci. Rev., 2020
2019
Characterization of splicing in digital images using gray scale co-occurrence matrices.
Proceedings of the 2019 Twelfth International Conference on Contemporary Computing, 2019
2018
User behavior analytics-based classification of application layer HTTP-GET flood attacks.
J. Netw. Comput. Appl., 2018
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events.
J. Netw. Comput. Appl., 2018
A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics.
Turkish J. Electr. Eng. Comput. Sci., 2018
Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018
2017
Multiagent Grid Syst., 2017
J. High Speed Networks, 2017
J. Commun., 2017
Int. J. Netw. Secur., 2017
Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review.
Int. J. Netw. Secur., 2017
Characterizing DDoS attacks and flash events: Review, research gaps and future directions.
Comput. Sci. Rev., 2017
Comput. Secur., 2017
Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation.
Comput. Commun., 2017
Comput. Networks, 2017
2016
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation.
Secur. Commun. Networks, 2016
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack.
J. Comput. Networks Commun., 2016
J. Inf. Secur. Appl., 2016
Int. J. Commun. Networks Distributed Syst., 2016
Comput. Secur., 2016
Performance Analysis of Predictive Stabilization for Churn Handling in Structured Overlay Networks.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016
2015
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015
2012
Secur. Commun. Networks, 2012
Int. J. Wirel. Mob. Comput., 2012
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
CoRR, 2012
The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review.
Appl. Comput. Intell. Soft Comput., 2012
2011
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011
2010
The use of artificial intelligence based techniques for intrusion detection: a review.
Artif. Intell. Rev., 2010
2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007