Подписаться
Abdulghani Ali Ahmed
Abdulghani Ali Ahmed
School of Computer Science and Informatics, De Montfort University, UK
Подтвержден адрес электронной почты в домене dmu.ac.uk
Название
Процитировано
Процитировано
Год
Comprehensive review of cybercrime detection techniques
WA Al-Khater, S Al-Maadeed, AA Ahmed, AS Sadiq, MK Khan
IEEE access 8, 137293-137311, 2020
1072020
Comprehensive survey on big data privacy protection
M Binjubeir, AA Ahmed, MAB Ismail, AS Sadiq, MK Khan
IEEE Access 8, 20067-20079, 2019
762019
Deep learning-based classification model for botnet attack detection
AA Ahmed, WA Jabbar, AS Sadiq, H Patel
Journal of Ambient Intelligence and Humanized Computing 13 (7), 3457-3466, 2022
722022
Real time detection of phishing websites
AA Ahmed, NA Abdullah
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
702016
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
AA Ahmed, MF Mohammed
Journal of Computational Science 25, 467-473, 2018
542018
Attack Intention Recognition: A Review.
AA Ahmed, NAK Zaman
Int. J. Netw. Secur. 19 (2), 244-250, 2017
502017
Filtration model for the detection of malicious traffic in large-scale networks
AA Ahmed, A Jantan, TC Wan
Computer Communications 82, 59-70, 2016
312016
Traceback model for identifying sources of distributed attacks in real time
AA Ahmed, AS Sadiq, MF Zolkipli
Security and Communication Networks 9 (13), 2173-2185, 2016
252016
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
AS Sadiq, TZ Almohammad, RABM Khadri, AA Ahmed, J Lloret
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017
232017
SLA-based complementary approach for network intrusion detection
AA Ahmed, A Jantan, TC Wan
Computer Communications 34 (14), 1738-1749, 2011
212011
Investigation approach for network attack intention recognition
AA Ahmed
Digital Forensics and Forensic Investigations: Breakthroughs in Research and …, 2020
192020
Real-time detection of intrusive traffic in QoS network domains
AA Ahmed, A Jantan, TC Wan
IEEE Security & Privacy 11 (6), 45-53, 2013
192013
Service violation monitoring model for detecting and tracing bandwidth abuse
AA Ahmed, A Jantan, M Rasmi
Journal of network and systems management 21, 218-237, 2013
182013
Dynamic reciprocal authentication protocol for mobile cloud computing
AA Ahmed, K Wendy, MN Kabir, AS Sadiq
IEEE Systems Journal 15 (1), 727-737, 2020
162020
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION.
OE Elejla, AB JANTAN, AALI AHMED
Journal of Theoretical & Applied Information Technology 70 (2), 2014
142014
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
AM Fahad, AA Ahmed, AH Alghushami, S Alani
Intelligent Computing & Optimization 1, 46-55, 2019
122019
Investigation model for DDoS attack detection in real-time
AA Ahmed
International Journal of Software Engineering and Computer Systems 1 (1), 93-105, 2015
122015
Normal parameter reduction algorithm in soft set based on hybrid binary particle swarm and biogeography optimizer
AS Sadiq, MA Tahir, AA Ahmed, A Alghushami
Neural Computing and Applications 32, 12221-12239, 2020
112020
Analyzing data remnant remains on user devices to determine probative artifacts in cloud environment
AA Ahmed, C Xue Li
Journal of forensic sciences 63 (1), 112-121, 2018
112018
Epilepsy detection from EEG signals using artificial neural network
AA Sallam, MN Kabir, AA Ahmed, K Farhan, E Tarek
Intelligent Computing & Optimization 1, 320-327, 2019
102019
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20