Follow
Abdulghani Ali Ahmed
Abdulghani Ali Ahmed
School of Computer Science and Informatics, De Montfort University, UK
Verified email at dmu.ac.uk
Title
Cited by
Cited by
Year
Comprehensive review of cybercrime detection techniques
WA Al-Khater, S Al-Maadeed, AA Ahmed, AS Sadiq, MK Khan
IEEE access 8, 137293-137311, 2020
1032020
Comprehensive survey on big data privacy protection
M Binjubeir, AA Ahmed, MAB Ismail, AS Sadiq, MK Khan
IEEE Access 8, 20067-20079, 2019
752019
Deep learning-based classification model for botnet attack detection
AA Ahmed, WA Jabbar, AS Sadiq, H Patel
Journal of Ambient Intelligence and Humanized Computing 13 (7), 3457-3466, 2022
722022
Real time detection of phishing websites
AA Ahmed, NA Abdullah
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
702016
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
AA Ahmed, MF Mohammed
Journal of Computational Science 25, 467-473, 2018
532018
Attack Intention Recognition: A Review.
AA Ahmed, NAK Zaman
Int. J. Netw. Secur. 19 (2), 244-250, 2017
502017
Filtration model for the detection of malicious traffic in large-scale networks
AA Ahmed, A Jantan, TC Wan
Computer Communications 82, 59-70, 2016
312016
Traceback model for identifying sources of distributed attacks in real time
AA Ahmed, AS Sadiq, MF Zolkipli
Security and Communication Networks 9 (13), 2173-2185, 2016
252016
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
AS Sadiq, TZ Almohammad, RABM Khadri, AA Ahmed, J Lloret
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017
232017
SLA-based complementary approach for network intrusion detection
AA Ahmed, A Jantan, TC Wan
Computer Communications 34 (14), 1738-1749, 2011
212011
Investigation approach for network attack intention recognition
AA Ahmed
Digital Forensics and Forensic Investigations: Breakthroughs in Research and …, 2020
192020
Real-time detection of intrusive traffic in QoS network domains
AA Ahmed, A Jantan, TC Wan
IEEE Security & Privacy 11 (6), 45-53, 2013
192013
Service violation monitoring model for detecting and tracing bandwidth abuse
AA Ahmed, A Jantan, M Rasmi
Journal of network and systems management 21, 218-237, 2013
182013
Dynamic reciprocal authentication protocol for mobile cloud computing
AA Ahmed, K Wendy, MN Kabir, AS Sadiq
IEEE Systems Journal 15 (1), 727-737, 2020
152020
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION.
OE Elejla, AB JANTAN, AALI AHMED
Journal of Theoretical & Applied Information Technology 70 (2), 2014
142014
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
AM Fahad, AA Ahmed, AH Alghushami, S Alani
Intelligent Computing & Optimization 1, 46-55, 2019
122019
Investigation model for DDoS attack detection in real-time
AA Ahmed
International Journal of Software Engineering and Computer Systems 1 (1), 93-105, 2015
122015
Normal parameter reduction algorithm in soft set based on hybrid binary particle swarm and biogeography optimizer
AS Sadiq, MA Tahir, AA Ahmed, A Alghushami
Neural Computing and Applications 32, 12221-12239, 2020
112020
Analyzing data remnant remains on user devices to determine probative artifacts in cloud environment
AA Ahmed, C Xue Li
Journal of forensic sciences 63 (1), 112-121, 2018
112018
Locating and collecting cybercrime evidences on cloud storage
AA Ahmed, CX Li
2016 International Conference on Information Science and Security (ICISS), 1-5, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20