Md Liakat Ali

Orcid: 0000-0001-8945-3230

According to our database1, Md Liakat Ali authored at least 28 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Machine Learning Algorithms for Diabetes Diagnosis Prediction.
Proceedings of the 2024 6th International Conference on Image, Video and Signal Processing, 2024

2023
Access Control, Biometrics, and the Future.
Proceedings of the 5th International Conference on Image, Video and Signal Processing, 2023

Social Engineering Incidents and Preventions.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

Network Packet Sniffing and Defense.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

A Comprehensive Review of Wireless Security Protocols and Encryption Applications.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

Machine Learning Models for Histopathological Breast Cancer Image Classification.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

2022
The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

2021
Top Reported Data Security Risks in the Age of COVID-19.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

2020
Classification of soybean leaf wilting due to drought stress using UAV-based imagery.
Comput. Electron. Agric., 2020

DASC: A Privacy-Protected Data Access System with Cache Mechanism for Smartphones.
Proceedings of the 29th Wireless and Optical Communications Conference, 2020

Creating and Using Secure Software.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

2019
Security Considerations for the Development of Secure Software Systems.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Applications of Machine Learning Tools in Genomics: A Review.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Challenges of Cyber Security and the Emerging Trends.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Concerns and Security for Hashing Passwords.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

POHMM/SVM: A Hybrid Approach for Keystroke Biometric User Authentication.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2018

2017
Keystroke Biometric Systems for User Authentication.
J. Signal Process. Syst., 2017

Biometric studies with hidden Markov model and its extension on short fixed-text input.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

2016
Connectivity, Traffic Flow and Applied Statistics in Cyber Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

An Analysis of Information Security Event Managers.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Keystroke Biometric User Verification Using Hidden Markov Model.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Impact of Cyber-Attacks on Critical Infrastructure.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Information Security Policy for E-Commerce in Saudi Arabia.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Authentication and Identification Methods Used in Keystroke Biometric Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Investigation on Cyber Security Threats and Security Models.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

An Approach to Minimize Crossings in Phylogenetic Trees.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Spoofing key-press latencies with a generative keystroke dynamics model.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015


  Loading...