default search action
Krishan Kumar 0001
Person information
- affiliation: Panjab University, University Institute of Engineering and Technology, Chandigarh, India
- affiliation (former): Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab, India
- affiliation (former): Punjab Technical University, Jalandhar, Punjab, India
Other persons with the same name
- Krishan Kumar — disambiguation page
- Krishan Kumar 0002 — National Institute of Technology, Hamirpur, India (and 1 more)
- Krishan Kumar 0003 — Visvesvaraya National Institute of Technology, Nagpur, India (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Veenu Rani, Munish Kumar, Aastha Gupta, Monika Sachdeva, Ajay Mittal, Krishan Kumar:
Self-supervised learning for medical image analysis: a comprehensive review. Evol. Syst. 15(4): 1607-1633 (2024) - [j50]Shaveta Dargan, Munish Kumar, Ajay Mittal, Krishan Kumar:
Handwriting-based gender classification using machine learning techniques. Multim. Tools Appl. 83(7): 19871-19895 (2024) - [j49]Harmandeep Kaur, Veenu Rani, Munish Kumar, Monika Sachdeva, Ajay Mittal, Krishan Kumar:
Federated learning: a comprehensive review of recent advances and applications. Multim. Tools Appl. 83(18): 54165-54188 (2024) - 2023
- [j48]Meenakshi Mittal, Krishan Kumar, Sunny Behal:
DL-2P-DDoSADF: Deep learning-based two-phase DDoS attack detection framework. J. Inf. Secur. Appl. 78: 103609 (2023) - [j47]Savita Walia, Krishan Kumar, Munish Kumar:
Unveiling digital image forgeries using Markov based quaternions in frequency domain and fusion of machine learning algorithms. Multim. Tools Appl. 82(3): 4517-4532 (2023) - [j46]Umang Ahuja, Sunil Singh, Munish Kumar, Krishan Kumar, Monika Sachdeva:
COVID-19: Social distancing monitoring using faster-RCNN and YOLOv3 algorithms. Multim. Tools Appl. 82(5): 7553-7566 (2023) - [j45]Harmandeep Kaur, Shally Bansal, Munish Kumar, Ajay Mittal, Krishan Kumar:
Worddeepnet: handwritten gurumukhi word recognition using convolutional neural network. Multim. Tools Appl. 82(30): 46763-46788 (2023) - [j44]Meenakshi Mittal, Krishan Kumar, Sunny Behal:
Deep learning approaches for detecting DDoS attacks: a systematic review. Soft Comput. 27(18): 13039-13075 (2023) - [j43]Harmandeep Kaur, Munish Kumar, Aastha Gupta, Monika Sachdeva, Ajay Mittal, Krishan Kumar:
Bagging: An Ensemble Approach for Recognition of Handwritten Place Names in Gurumukhi Script. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(7): 198:1-198:25 (2023) - 2022
- [j42]Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar:
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. Clust. Comput. 25(2): 1355-1372 (2022) - [j41]Karamjeet Kaur, Veenu Mangat, Krishan Kumar:
A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture. Comput. Networks 217: 109281 (2022) - [j40]Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar, Sunny Behal:
E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks. J. King Saud Univ. Comput. Inf. Sci. 34(4): 1373-1387 (2022) - [j39]Syed Tufael Nabi, Munish Kumar, Paramjeet Singh, Naveen Aggarwal, Krishan Kumar:
A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions. Multim. Syst. 28(3): 939-992 (2022) - [j38]Saboor Koul, Munish Kumar, Surinder Singh Khurana, Faisel Mushtaq, Krishan Kumar:
An efficient approach for copy-move image forgery detection using convolution neural network. Multim. Tools Appl. 81(8): 11259-11277 (2022) - [j37]Savita Walia, Krishan Kumar, Saurabh Agarwal, Hyunsung Kim:
Using XAI for Deep Learning-Based Image Manipulation Detection with Shapley Additive Explanation. Symmetry 14(8): 1611 (2022) - [j36]Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar:
KS-DDoS: Kafka streams-based classification approach for DDoS attacks. J. Supercomput. 78(6): 8946-8976 (2022) - [c9]Karamjeet Kaur, Veenu Mangat, Krishan Kumar:
Towards an Open-Source NFV Management and Orchestration Framework. COMSNETS 2022: 251-255 - [p2]Veenu Rani, Munish Kumar, Ajay Mittal, Krishan Kumar:
Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities. Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities 2022: 73-88 - 2021
- [j35]Savita Walia, Krishan Kumar, Munish Kumar, Xiao-Zhi Gao:
Fusion of Handcrafted and Deep Features for Forgery Detection in Digital Images. IEEE Access 9: 99742-99755 (2021) - [j34]Sukhveer Kaur, Krishan Kumar, Naveen Aggarwal:
A review on P4-Programmable data planes: Architecture, research efforts, and future directions. Comput. Commun. 170: 109-129 (2021) - [j33]Sukhveer Kaur, Krishan Kumar, Naveen Aggarwal, Gurdeep Singh:
A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions. Comput. Secur. 110: 102423 (2021) - [j32]Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar:
Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions. Concurr. Comput. Pract. Exp. 33(10) (2021) - [j31]Abhinav Bhandari, Krishan Kumar, Amrit Lal Sangal, Sunny Behal:
An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks. J. Ambient Intell. Humaniz. Comput. 12(1): 1387-1406 (2021) - [j30]Sunny Behal, Krishan Kumar, Monika Sachdeva:
D-FAC: A novel ϕ-Divergence based distributed DDoS defense system. J. King Saud Univ. Comput. Inf. Sci. 33(3): 291-303 (2021) - [j29]Munish Kumar, Navdeep Singh, Ravinder Kumar, Shubham Goel, Krishan Kumar:
Gait recognition based on vision systems: A systematic survey. J. Vis. Commun. Image Represent. 75: 103052 (2021) - [j28]Sunil Singh, Umang Ahuja, Munish Kumar, Krishan Kumar, Monika Sachdeva:
Face mask detection using YOLOv3 and faster R-CNN models: COVID-19 environment. Multim. Tools Appl. 80(13): 19753-19768 (2021) - [j27]Monika Bansal, Munish Kumar, Manish Kumar, Krishan Kumar:
An efficient technique for object recognition using Shi-Tomasi corner detection algorithm. Soft Comput. 25(6): 4423-4432 (2021) - [j26]Maruthi Rohit Ayyagari, Nishtha Kesswani, Munish Kumar, Krishan Kumar:
Intrusion detection techniques in network environment: a systematic review. Wirel. Networks 27(2): 1269-1285 (2021) - 2020
- [j25]Karamjeet Kaur, Veenu Mangat, Krishan Kumar:
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture. Comput. Sci. Rev. 38: 100298 (2020) - [j24]Munish Kumar, Surbhi Gupta, Krishan Kumar, Monika Sachdeva:
SPREADING OF COVID-19 IN INDIA, ITALY, JAPAN, SPAIN, UK, US: A Prediction Using ARIMA and LSTM Model. Digit. Gov. Res. Pract. 1(4): 24:1-24:9 (2020) - [j23]Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar:
S-DDoS: Apache spark based real-time DDoS detection system. J. Intell. Fuzzy Syst. 38(5): 6527-6535 (2020)
2010 – 2019
- 2019
- [c8]Savita Walia, Krishan Kumar:
Characterization of splicing in digital images using gray scale co-occurrence matrices. IC3 2019: 1-6 - 2018
- [j22]Sunny Behal, Krishan Kumar, Monika Sachdeva:
A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics. Turkish J. Electr. Eng. Comput. Sci. 26(4): 1759-1770 (2018) - [j21]Sunny Behal, Krishan Kumar, Monika Sachdeva:
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events. J. Netw. Comput. Appl. 111: 49-63 (2018) - [j20]Karanpreet Singh, Paramvir Singh, Krishan Kumar:
User behavior analytics-based classification of application layer HTTP-GET flood attacks. J. Netw. Comput. Appl. 112: 97-114 (2018) - [c7]Amanpreet Kaur, Savita Walia, Krishan Kumar:
Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods. IC3 2018: 1-5 - 2017
- [j19]Sunny Behal, Krishan Kumar:
Detection of DDoS attacks and flash events using novel information theory metrics. Comput. Networks 116: 96-110 (2017) - [j18]Sunny Behal, Krishan Kumar:
Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation. Comput. Commun. 103: 18-28 (2017) - [j17]Karanpreet Singh, Paramvir Singh, Krishan Kumar:
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges. Comput. Secur. 65: 344-372 (2017) - [j16]Sunny Behal, Krishan Kumar, Monika Sachdeva:
Characterizing DDoS attacks and flash events: Review, research gaps and future directions. Comput. Sci. Rev. 25: 101-114 (2017) - [j15]Sunny Behal, Krishan Kumar:
Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. Int. J. Netw. Secur. 19(3): 383-393 (2017) - [j14]Sunny Behal, Krishan Kumar, Monika Sachdeva:
Discriminating Flash Events from DDoS Attacks: A Comprehensive Review. Int. J. Netw. Secur. 19(5): 734-741 (2017) - [j13]Mandeep Kaur Gulati, Monika Sachdeva, Krishan Kumar:
Load Balanced and Link Break Prediction Routing Protocol for Mobile Ad Hoc Networks. J. Commun. 12(6): 353-363 (2017) - [j12]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja:
Overlay based defensive architecture to survive DDoS: A comparative study. J. High Speed Networks 23(1): 67-91 (2017) - [j11]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja:
Churn handling strategies for structured overlay networks: A survey. Multiagent Grid Syst. 13(4): 331-351 (2017) - 2016
- [j10]Karanpreet Singh, Paramvir Singh, Krishan Kumar:
A systematic review of IP traceback schemes for denial of service attacks. Comput. Secur. 56: 111-139 (2016) - [j9]Mandeep Kaur Gulati, Krishan Kumar:
Cross layer weight based on demand routing protocol for mobile ad hoc networks. Int. J. Commun. Networks Distributed Syst. 16(1): 29-47 (2016) - [j8]Monika Sachdeva, Krishan Kumar, Gurvinder Singh:
A comprehensive approach to discriminate DDoS attacks from flash events. J. Inf. Secur. Appl. 26: 8-22 (2016) - [j7]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja:
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack. J. Comput. Networks Commun. 2016: 5191405:1-5191405:15 (2016) - [j6]Abhinav Bhandari, Amrit Lal Sangal, Krishan Kumar Saluja:
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation. Secur. Commun. Networks 9(13): 2222-2239 (2016) - [c6]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar:
Performance Analysis of Predictive Stabilization for Churn Handling in Structured Overlay Networks. BDAW 2016: 39:1-39:7 - 2015
- [p1]Gulshan Kumar, Krishan Kumar:
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks. Intelligent Methods for Cyber Warfare 2015: 173-200 - 2012
- [j5]Gulshan Kumar, Krishan Kumar:
The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review. Appl. Comput. Intell. Soft Comput. 2012: 850160:1-850160:20 (2012) - [j4]Mandeep Kaur Gulati, Krishan Kumar:
QoS routing protocols for mobile ad hoc networks: a survey. Int. J. Wirel. Mob. Comput. 5(2): 107-118 (2012) - [j3]Gulshan Kumar, Krishan Kumar:
An information theoretic approach for feature selection. Secur. Commun. Networks 5(2): 178-185 (2012) - [i1]Preeti Sharma, Monika Saluja, Krishan Kumar Saluja:
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey. CoRR abs/1205.4905 (2012) - 2011
- [c5]Gulshan Kumar, Krishan Kumar:
AI based supervised classifiers: an analysis for intrusion detection. ACAI 2011: 170-174 - [c4]Abhinav Bhandari, Amrit Lal Sangal, Krishan Kumar Saluja:
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks. ADCONS 2011: 534-540 - [c3]Ketki Arora, Krishan Kumar, Monika Sachdeva:
Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed. ADCONS 2011: 541-550 - [c2]Gulshan Kumar, Krishan Kumar:
A novel evaluation function for feature selection based upon information theory. CCECE 2011: 395-399 - 2010
- [j2]Gulshan Kumar, Krishan Kumar, Monika Sachdeva:
The use of artificial intelligence based techniques for intrusion detection: a review. Artif. Intell. Rev. 34(4): 369-387 (2010) - [j1]Monika Sachdeva, Gurvinder Singh, Krishan Kumar, Kuldip Singh:
DDoS Incidents and their Impact: A Review. Int. Arab J. Inf. Technol. 7(1): 14-20 (2010)
2000 – 2009
- 2007
- [c1]Anjali Sardana, Krishan Kumar, Ramesh Chandra Joshi:
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. IAS 2007: 191-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint