Follow
Ahmad Almulhem
Ahmad Almulhem
Verified email at kfupm.edu.sa - Homepage
Title
Cited by
Cited by
Year
Network forensics: Notions and challenges
A Almulhem
2009 IEEE International Symposium on Signal Processing and Information …, 2009
632009
PLC access control: a security analysis
H Wardak, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
612016
On PLC network security
A Ghaleb, S Zhioua, A Almulhem
International Journal of Critical Infrastructure Protection 22, 62-69, 2018
582018
A graphical password authentication system
A Almulhem
2011 world congress on internet security (WorldCIS-2011), 223-225, 2011
412011
Digital fingerprinting based on keystroke dynamics.
AAE Ahmed, I Traore, A Ahmed
HAISA, 94-104, 2008
382008
Threat modeling for electronic health record systems
A Almulhem
Journal of medical systems 36, 2921-2926, 2012
372012
Experience with engineering a network forensics system
A Almulhem, I Traore
International Conference on Information Networking, 62-71, 2005
362005
Scada-sst: a scada security testbed
A Ghaleb, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
322016
Threat modeling of a multi-UAV system
A Almulhem
Transportation Research Part A: policy and practice 142, 290-295, 2020
242020
A survey of connection-chains detection techniques
A Almulhem, I Traore
2007 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2007
132007
Detecting connection-chains: a data mining approach.
A Almulhem, I Traore
Int. J. Netw. Secur. 10 (1), 62-74, 2010
92010
Light-weight file fragments classification using depthwise separable convolutions
KM Saaim, M Felemban, S Alsaleh, A Almulhem
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022
52022
Mining and detecting connection-chains in network traffic
A Almulhem, I Traore
Trust Management: Proceedings of IFIPTM 2007: Joint iTrust and PST …, 2007
52007
Identification of image fragments for file carving
A Al-Sadi, MB Yahya, A Almulhem
World Congress on Internet Security (WorldCIS-2013), 151-155, 2013
42013
Profiling distributed connection chains
A Almulhem, I Traore
International Journal of Communication Networks and Distributed Systems 1 (1 …, 2008
42008
Detection and analysis of connection chains in network forensics
A Almulhem
42007
Connection-chains: A review and taxonomy
A Almulhem, I Traore
ECE Department, University of Victoria, Tech. Rep. ECE-05.4 12, 2005
32005
Access Control
A Almulhem
2008
Session 3: intelligent control theory and applications
E O’Connor, B O’Donnell, J Walsh, H Wardak, S Zhioua, A Almulhem, ...
Session 2: cyber security
A Ghaleb, S Zhioua, A Almulhem, AA Yaseen, M Bayart, ...
The system can't perform the operation now. Try again later.
Articles 1–20