Ahmed Patel
Cited by
Cited by
An intrusion detection and prevention system in cloud computing: A systematic review
A Patel, M Taghavi, K Bakhtiyari, JC Jśnior
Journal of network and computer applications 36 (1), 25-41, 2013
Comparative review study of reactive and proactive routing protocols in MANETs
S Mohseni, R Hassan, A Patel, R Razali
4th IEEE International Conference on Digital ecosystems and technologies …, 2010
A survey of intrusion detection and prevention systems
A Patel, Q Qassim, C Wills
Information Management & Computer Security 18 (4), 277-290, 2010
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham
Engineering Applications of Artificial Intelligence 32, 228-241, 2014
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
S Shamshirband, NB Anuar, MLM Kiah, A Patel
Engineering Applications of Artificial Intelligence 26 (9), 2105-2127, 2013
Finite state machine approach to digital event reconstruction
P Gladyshev, A Patel
Digital Investigation 1 (2), 130-149, 2004
Review of pricing models for grid & cloud computing
P Samimi, A Patel
2011 IEEE Symposium on Computers & Informatics, 634-639, 2011
Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers
S Al-Janabi, S Rawat, A Patel, I Al-Shourbaji
International Journal of Electrical Power & Energy Systems 67, 324-335, 2015
Security architecture for open distributed systems
S Muftic, A Patel, P Sanders, R Colon, J Heijnsdijk, U Pulkkinen
John Wiley & Sons, Inc., 1993
A comparative review of IPv4 and IPv6 for research test bed
MK Sailan, R Hassan, A Patel
2009 International Conference on electrical engineering and informatics 2 …, 2009
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems
A Patel, H Alhussian, JM Pedersen, B Bounabat, JC Jśnior, S Katsikas
Computers & Security 64, 92-109, 2017
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review
Y Baashar, H Alhussian, A Patel, G Alkawsi, AI Alzahrani, O Alfarraj, ...
Computer Standards & Interfaces 71, 103442, 2020
Finite state machine analysis of a blackmail investigation
P Gladyshev, A Patel
International Journal of Digital Evidence 4 (1), 1-13, 2005
Formalising event time bounding in digital investigations
P Gladyshev, A Patel
International Journal of Digital Evidence 4 (2), 1-14, 2005
Comparative study and review of grid, cloud, utility computing and software as a service for use by libraries
A Patel, A Seyfi, Y Tew, A Jaradat
Library Hi Tech News 28 (3), 25-32, 2011
An inclusive and extensible architecture for electronic brokerage
J Hands, M Bessonov, M Blinov, A Patel, R Smith
Decision Support Systems 29 (4), 305-321, 2000
Stable multicast trees based on ant colony optimization for vehicular ad hoc networks
AB Souza, J Celestino, FA Xavier, FD Oliveira, A Patel, M Latifi
The International Conference on Information Networking 2013 (ICOIN), 101-106, 2013
An analysis of web proxy logs with query distribution pattern approach for search engines
M Taghavi, A Patel, N Schmidt, C Wills, Y Tew
Computer Standards & Interfaces 34 (1), 162-170, 2012
Rapid lossless compression of short text messages
K Kalajdzic, SH Ali, A Patel
Computer Standards & Interfaces 37, 53-59, 2015
Autonomic agent-based self-managed intrusion detection and prevention system
A Patel, Q Qassim, Z Shukor, J Nogueira, J Jśnior, C Wills, P Federal
Proceedings of the South African information security multi-conference …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20