An intrusion detection and prevention system in cloud computing: A systematic review A Patel, M Taghavi, K Bakhtiyari, JC Jśnior Journal of network and computer applications 36 (1), 25-41, 2013 | 512 | 2013 |
Comparative review study of reactive and proactive routing protocols in MANETs S Mohseni, R Hassan, A Patel, R Razali 4th IEEE International Conference on Digital ecosystems and technologies …, 2010 | 177 | 2010 |
A survey of intrusion detection and prevention systems A Patel, Q Qassim, C Wills Information Management & Computer Security 18 (4), 277-290, 2010 | 170 | 2010 |
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham Engineering Applications of Artificial Intelligence 32, 228-241, 2014 | 164 | 2014 |
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique S Shamshirband, NB Anuar, MLM Kiah, A Patel Engineering Applications of Artificial Intelligence 26 (9), 2105-2127, 2013 | 157 | 2013 |
Finite state machine approach to digital event reconstruction P Gladyshev, A Patel Digital Investigation 1 (2), 130-149, 2004 | 153 | 2004 |
Review of pricing models for grid & cloud computing P Samimi, A Patel 2011 IEEE Symposium on Computers & Informatics, 634-639, 2011 | 122 | 2011 |
Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers S Al-Janabi, S Rawat, A Patel, I Al-Shourbaji International Journal of Electrical Power & Energy Systems 67, 324-335, 2015 | 91 | 2015 |
Security architecture for open distributed systems S Muftic, A Patel, P Sanders, R Colon, J Heijnsdijk, U Pulkkinen John Wiley & Sons, Inc., 1993 | 79 | 1993 |
A comparative review of IPv4 and IPv6 for research test bed MK Sailan, R Hassan, A Patel 2009 International Conference on electrical engineering and informatics 2 …, 2009 | 70 | 2009 |
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems A Patel, H Alhussian, JM Pedersen, B Bounabat, JC Jśnior, S Katsikas Computers & Security 64, 92-109, 2017 | 65 | 2017 |
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review Y Baashar, H Alhussian, A Patel, G Alkawsi, AI Alzahrani, O Alfarraj, ... Computer Standards & Interfaces 71, 103442, 2020 | 63 | 2020 |
Finite state machine analysis of a blackmail investigation P Gladyshev, A Patel International Journal of Digital Evidence 4 (1), 1-13, 2005 | 61 | 2005 |
Formalising event time bounding in digital investigations P Gladyshev, A Patel International Journal of Digital Evidence 4 (2), 1-14, 2005 | 59 | 2005 |
Comparative study and review of grid, cloud, utility computing and software as a service for use by libraries A Patel, A Seyfi, Y Tew, A Jaradat Library Hi Tech News 28 (3), 25-32, 2011 | 56 | 2011 |
An inclusive and extensible architecture for electronic brokerage J Hands, M Bessonov, M Blinov, A Patel, R Smith Decision Support Systems 29 (4), 305-321, 2000 | 53 | 2000 |
Stable multicast trees based on ant colony optimization for vehicular ad hoc networks AB Souza, J Celestino, FA Xavier, FD Oliveira, A Patel, M Latifi The International Conference on Information Networking 2013 (ICOIN), 101-106, 2013 | 50 | 2013 |
An analysis of web proxy logs with query distribution pattern approach for search engines M Taghavi, A Patel, N Schmidt, C Wills, Y Tew Computer Standards & Interfaces 34 (1), 162-170, 2012 | 50 | 2012 |
Rapid lossless compression of short text messages K Kalajdzic, SH Ali, A Patel Computer Standards & Interfaces 37, 53-59, 2015 | 47 | 2015 |
Autonomic agent-based self-managed intrusion detection and prevention system A Patel, Q Qassim, Z Shukor, J Nogueira, J Jśnior, C Wills, P Federal Proceedings of the South African information security multi-conference …, 2011 | 47 | 2011 |