Mohiuddin Ahmed
Mohiuddin Ahmed
Senior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior Member
Adresă de e-mail confirmată pe ecu.edu.au - Pagina de pornire
Citat de
Citat de
A survey of network anomaly detection techniques
M Ahmed, A Mahmood, J Hu
Journal of Network and Computer Applications 60, 19-31, 2016
A survey of anomaly detection techniques in financial domain
M Ahmed, A Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
The k-means Algorithm: A Comprehensive Survey and Performance
M Ahmed, R Seraj, SMS Islam
Electronics 9 (8), 1-12, 2020
A Novel Approach for Outlier Detection and Clustering Improvement
M Ahmed, A Mahmood
8th IEEE International Conference on Industrial Electronics and Applications …, 2013
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection
M Ahmed, A Mahmood
Annals of Data Science, 2015
Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making
J Yang, MM Hassan, NY Lee, M Ahmed, CS Kim
Applied Sciences 9 (7), 2019
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems
M Ahmed, A Anwar, A Mahmood, Z Shah, MJ Maher
Transactions on Industrial Networks and Intelligent Systems 15 (3), 1-16, 2015
Data summarization: a survey
M Ahmed
Knowledge and Information Systems, 1-25, 2018
Network Traffic Analysis based on Collective Anomaly Detection
M Ahmed, A Mahmood
9th IEEE International Conference on Industrial Electronics and Applications …, 2014
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure
M Ahmed, ASK Pathan
Complex Adaptive Systems Modeling 8 (4), 1-14, 2020
False Data Injection Attacks in Internet of Things
B Bostami, M Ahmed, S Choudhury
Performability in Internet of Things, 47-58, 2018
Anomaly Detection on Big Data in Financial Markets
M Ahmed, N Choudhury, S Uddin
2017 IEEE/ACM International Conference on Advances in Social Networks …, 2017
False Data Injection Attacks in Healthcare
M Ahmed, ASSM Barkat Ullah
Fifteenth Australasian Data Mining Conference, 2017
Collective anomaly detection techniques for network traffic analysis
M Ahmed
Annals of data science 5 (4), 497-512, 2018
Network Traffic Pattern Analysis using Improved Information Theoretic Co-clustering based Collective Anomaly Detection
M Ahmed, A Mahmood
International Conference on Security and Privacy in Communication Networks …, 2015
Explainable artificial intelligence approaches: A survey
SR Islam, W Eberle, SK Ghafoor, M Ahmed
arXiv preprint arXiv:2101.09429, 2021
Outlier Detection
M Ahmed, A Mahmood, J Hu
CRC Press, Taylor & Francis Group, USA, 2014
Blockchain: Can It Be Trusted?
M Ahmed, ASK Pathan
Computer 53 (4), 31-35, 2020
Biometrics for Internet-of-Things Security: A Review
W Yang, S Wang, NM Sahri, N Karie, M Ahmed, C Valli
Sensors 21 (18), 1-26, 2021
A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET
AFMS Akhter, M Ahmed, AFMS Shah, A Anwar, A Zengin
Sustainability 13 (1), 1-25, 2021
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20