Follow
Abdulghani Ali Ahmed
Abdulghani Ali Ahmed
School of Computer Science and Informatics, De Montfort University, UK
Verified email at dmu.ac.uk
Title
Cited by
Cited by
Year
Comprehensive review of cybercrime detection techniques
WA Al-Khater, S Al-Maadeed, AA Ahmed, AS Sadiq, MK Khan
IEEE access 8, 137293-137311, 2020
1512020
Comprehensive survey on big data privacy protection
M Binjubeir, AA Ahmed, MAB Ismail, AS Sadiq, MK Khan
IEEE Access 8, 20067-20079, 2019
982019
The effect of ERP system implementation on business performance: An exploratory case-study
A Ahmed, M Ayman
Communications of the IBIMA, 2011
952011
Deep learning-based classification model for botnet attack detection
AA Ahmed, WA Jabbar, AS Sadiq, H Patel
Journal of Ambient Intelligence and Humanized Computing 13 (7), 3457-3466, 2022
882022
Real time detection of phishing websites
AA Ahmed, NA Abdullah
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
792016
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
AA Ahmed, MF Mohammed
Journal of Computational Science 25, 467-473, 2018
582018
Attack Intention Recognition: A Review.
AA Ahmed, NAK Zaman
Int. J. Netw. Secur. 19 (2), 244-250, 2017
522017
Filtration model for the detection of malicious traffic in large-scale networks
AA Ahmed, A Jantan, TC Wan
Computer Communications 82, 59-70, 2016
322016
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
AS Sadiq, TZ Almohammad, RABM Khadri, AA Ahmed, J Lloret
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017
272017
Traceback model for identifying sources of distributed attacks in real time
AA Ahmed, AS Sadiq, MF Zolkipli
Security and Communication Networks 9 (13), 2173-2185, 2016
252016
SLA-based complementary approach for network intrusion detection
AA Ahmed, A Jantan, TC Wan
Computer Communications 34 (14), 1738-1749, 2011
222011
Investigation approach for network attack intention recognition
AA Ahmed
Digital Forensics and Forensic Investigations: Breakthroughs in Research and …, 2020
212020
Real-time detection of intrusive traffic in QoS network domains
AA Ahmed, A Jantan, TC Wan
IEEE Security & Privacy 11 (6), 45-53, 2013
192013
Dynamic reciprocal authentication protocol for mobile cloud computing
AA Ahmed, K Wendy, MN Kabir, AS Sadiq
IEEE Systems Journal 15 (1), 727-737, 2020
182020
Service violation monitoring model for detecting and tracing bandwidth abuse
AA Ahmed, A Jantan, M Rasmi
Journal of network and systems management 21, 218-237, 2013
182013
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION.
OE Elejla, AB JANTAN, AALI AHMED
Journal of Theoretical & Applied Information Technology 70 (2), 2014
142014
Normal parameter reduction algorithm in soft set based on hybrid binary particle swarm and biogeography optimizer
AS Sadiq, MA Tahir, AA Ahmed, A Alghushami
Neural Computing and Applications 32, 12221-12239, 2020
132020
Detection of black hole attacks in mobile ad hoc networks via hsa-cbds method
AM Fahad, AA Ahmed, AH Alghushami, S Alani
Intelligent Computing & Optimization 1, 46-55, 2019
132019
Epilepsy detection from EEG signals using artificial neural network
AA Sallam, MN Kabir, AA Ahmed, K Farhan, E Tarek
Intelligent Computing & Optimization 1, 320-327, 2019
122019
Analyzing data remnant remains on user devices to determine probative artifacts in cloud environment
AA Ahmed, C Xue Li
Journal of forensic sciences 63 (1), 112-121, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20