Follow
Dr. Krishan Kumar Saluja
Dr. Krishan Kumar Saluja
Professor, Information Technology, UIET, Panjab University, Chandigarh
Verified email at pu.ac.in
Title
Cited by
Cited by
Year
Face mask detection using YOLOv3 and faster R-CNN models: COVID-19 environment
S Singh, U Ahuja, M Kumar, K Kumar, M Sachdeva
Multimedia Tools and Applications 80 (13), 19753-19768, 2021
2462021
The use of artificial intelligence based techniques for intrusion detection: a review
G Kumar, K Kumar, M Sachdeva
Artificial Intelligence Review 34 (4), 369-387, 2010
2062010
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges
K Singh, P Singh, K Kumar
Computers & security 65, 344-372, 2017
1432017
Detection of DDoS Attacks and Flash Events using Novel Information Theory Metrics
S Behal, K Kumar
Computer Networks, 2017
1402017
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events
S Behal, K Kumar, M Sachdeva
Journal of Network and Computer Applications 111, 49-63, 2018
1312018
A distributed approach using entropy to detect DDoS attacks in ISP domain
K Kumar, RC Joshi, K Singh
2007 International Conference on Signal Processing, Communications and …, 2007
1282007
Round-robin based load balancing in Software Defined Networking
S Kaur, J Singh, K Kumar, Ghumman, N.S.
IEEE 2nd International Conference on Computing for Sustainable Global …, 2015
1162015
Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review.
S Behal, K Kumar
Int. J. Netw. Secur. 19 (3), 383-393, 2017
952017
An efficient technique for object recognition using Shi-Tomasi corner detection algorithm
M Bansal, M Kumar, M Kumar, K Kumar
Soft Computing 25 (6), 4423-4432, 2021
942021
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture
K Kaur, V Mangat, K Kumar
Computer Science Review 38, 100298, 2020
932020
Deep learning approaches for detecting DDoS attacks: a systematic review
M Mittal, K Kumar, S Behal
Soft Computing, 1-37, 2022
892022
A comprehensive approach to discriminate DDoS attacks from flash events
M Sachdeva, K Kumar, G Singh
Journal of information security and applications 26, 8-22, 2016
822016
Trends in validation of DDoS research
S Behal, K Kumar
Procedia Computer Science 85, 7-15, 2016
822016
Digital image forgery detection: a systematic scrutiny
S Walia, K Kumar
Australian Journal of Forensic Sciences 51 (5), 488-526, 2019
802019
Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation
A Bhandari, AL Sangal, K Kumar
Security and Communication Networks 9 (13), 2222-2239, 2016
762016
Detection of HELLO flood attack on LEACH protocol
S Magotra, K Kumar
Advance Computing Conference (IACC), 2014 IEEE International, 193-198, 2014
652014
Detection of DDoS Attacks and Flash Events using Information Theory Metrics - An Empirical Investigation
S Behal, K Kumar
Computer Communications, 2017
632017
Impact analysis of recent DDoS attacks
K Arora, K Kumar, M Sachdeva
International Journal on Computer Science and Engineering 3 (2), 877-883, 2011
632011
DDoS Incidents and their Impact: A Review.
M Sachdeva, G Singh, K Kumar, K Singh
Int. Arab J. Inf. Technol. 7 (1), 14-20, 2010
632010
Characterizing DDoS attacks and flash events: Review, research gaps and future directions
S Behal, K Kumar, M Sachdeva
Computer Science Review 25, 101-114, 2017
592017
The system can't perform the operation now. Try again later.
Articles 1–20