Urmăriți
Abdulghani Ali Ahmed
Abdulghani Ali Ahmed
School of Computer Science and Informatics, De Montfort University, UK
Adresă de e-mail confirmată pe dmu.ac.uk
Titlu
Citat de
Citat de
Anul
Real time detection of phishing websites
AA Ahmed, NA Abdullah
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
572016
Attack Intention Recognition: A Review.
AA Ahmed, NAK Zaman
Int. J. Netw. Secur. 19 (2), 244-250, 2017
422017
Deep learning-based classification model for botnet attack detection
AA Ahmed, WA Jabbar, AS Sadiq, H Patel
Journal of Ambient Intelligence and Humanized Computing, 1-10, 2020
382020
Comprehensive review of cybercrime detection techniques
WA Al-Khater, S Al-Maadeed, AA Ahmed, AS Sadiq, MK Khan
IEEE Access 8, 137293-137311, 2020
352020
Comprehensive survey on big data privacy protection
M Binjubeir, AA Ahmed, MAB Ismail, AS Sadiq, MK Khan
IEEE Access 8, 20067-20079, 2019
342019
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
AA Ahmed, MF Mohammed
Journal of Computational Science 25, 467-473, 2018
292018
Filtration model for the detection of malicious traffic in large-scale networks
AA Ahmed, A Jantan, TC Wan
Computer Communications 82, 59-70, 2016
282016
Traceback model for identifying sources of distributed attacks in real time
AA Ahmed, AS Sadiq, MF Zolkipli
Security and Communication Networks 9 (13), 2173-2185, 2016
232016
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
AS Sadiq, TZ Almohammad, RABM Khadri, AA Ahmed, J Lloret
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017
212017
Real-time detection of intrusive traffic in QoS network domains
AA Ahmed, A Jantan, TC Wan
IEEE Security & Privacy 11 (6), 45-53, 2013
202013
SLA-based complementary approach for network intrusion detection
AA Ahmed, A Jantan, TC Wan
Computer Communications 34 (14), 1738-1749, 2011
202011
Investigation approach for network attack intention recognition
AA Ahmed
Digital Forensics and Forensic Investigations: Breakthroughs in Research and …, 2020
192020
Service violation monitoring model for detecting and tracing bandwidth abuse
AA Ahmed, A Jantan, M Rasmi
Journal of network and systems management 21 (2), 218-237, 2013
192013
Investigation model for DDoS attack detection in real-time
AA Ahmed
International Journal of Software Engineering and Computer Systems 1 (1), 93-105, 2015
182015
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION.
OE Elejla, AB JANTAN, AALI AHMED
Journal of Theoretical & Applied Information Technology 70 (2), 2014
142014
Analyzing data remnant remains on user devices to determine probative artifacts in cloud environment
AA Ahmed, C Xue Li
Journal of forensic sciences 63 (1), 112-121, 2018
102018
Detection of black hole attacks in mobile ad hoc networks via hsa-cbds method
AM Fahad, AA Ahmed, AH Alghushami, S Alani
International conference on intelligent computing & optimization, 46-55, 2018
92018
A potent model for unwanted traffic detection in QoS network domain
AA Ahmed, A Jantan, GA Ali
International Journal of Digital Content Technology and its Applications 4 (2), 2010
92010
Dynamic reciprocal authentication protocol for mobile cloud computing
AA Ahmed, K Wendy, MN Kabir, AS Sadiq
IEEE Systems Journal 15 (1), 727-737, 2020
82020
Normal parameter reduction algorithm in soft set based on hybrid binary particle swarm and biogeography optimizer
AS Sadiq, MA Tahir, AA Ahmed, A Alghushami
Neural Computing and Applications 32 (16), 12221-12239, 2020
82020
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20