Browse by Author All List
Up a level |
A
Ahmed, Abdulghani Ali and Kwan, Wendy and Kabir, M. N. and Sadiq, Ali Safaa (2021) Dynamic reciprocal authentication protocol for mobile cloud computing. IEEE Systems Journal, 15 (1). 727 -737. ISSN 1932-8184. (Published)
Ahmed, Abdulghani Ali and Jabbar, Waheb A. and Sadiq, Ali Safa and Patel, Hiran (2020) Deep learning-based classification model for botnet attack detection. Journal of Ambient Intelligence and Humanized Computing. pp. 1-10. ISSN 1868-5145. (Published)
Ahmed, Abdulghani Ali (2019) Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network. In: Computational Intelligence in Information Systems: Proceedings of the Computational Intelligence in Information Systems Conference (CIIS 2018) , 16-18 November 2018 , Brunei. pp. 24-35., 888. ISBN 978-3-030-03302-6 (Published)
Ahmed, Abdulghani Ali (2018) Detection and avoidance technique of anomalous congestion at the network gateways. In: 15th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing , 6-11 November 2017 , Orlando, United States. pp. 681-686., 2018. ISBN 978-153861955-1 (Published)
Ahmed, Abdulghani Ali and Chua, Xue Li (2018) Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment. Journal of Forensic Sciences, 63 (1). pp. 112-121. ISSN 0022-1198. (Published)
Amer, Salam and M. Nomani, Kabir and Ahmed, Abdulghani Ali and Farhan, Khalid (2018) Epilepsy detection using EEG signals. In: International Conference on Intelligent Computing and Optimization (ICO2018) , 4 - 5 Oct 2018 , Pattaya, Thailand. pp. 1-18.. (Unpublished) (Unpublished)
Ahmed, Abdulghani Ali and Mohammed, Mohammed Falah (2018) SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network. Journal of Computational Science, 25. pp. 467-473. ISSN 1877-7503. (Published)
Ahmed, Abdulghani Ali and Kit, Yee Wai (2017) MICIE: A model for identifying and collecting intrusion evidences. In: 12th International Conference on Signal Image Technology and Internet-Based Systems (SITIS 2016) , 28 November - 1 December 2016 , Naples, Italy. pp. 288-294.. ISBN 978-1-5090-5698-9 (Published)
Ahmed, Abdulghani Ali and Noorul Ahlami, Kamarul Zaman (2017) AIRSE : an approach for attack intention recognition based on similarity of evidences. In: 1st EAI International Conference on Computer Science and Engineering, COMPSE 2016 , 11-12 November 2016 , Penang, Malaysia. . ISBN 9781631901362 (Published)
Ahmed, Abdulghani Ali and Li, Chua Xue (2017) Locating and collecting cybercrime evidences on cloud storage: review. In: 3rd International Conference on Information Science and Security (ICISS 2016) , 19-22 December 2016 , Pattaya, Thailand. pp. 1-5.. ISBN 978-1-5090-5493-0 (Published)
Ahmed, Abdulghani Ali and Noorul Ahlami, Kamarul Zaman (2017) Attack Intention Recognition: A Review. International Journal of Network Security, 19 (2). pp. 244-250. ISSN 1816-353X (Print); 1816-3548 (Online). (Published)
Adekiigbe, Adebanjo and Ahmed, Abdulghani Ali and Sadiq, Ali Safa and Ghafoor, Kayhan Zrar and Kamalrulnizam, Abu Bakar (2017) An Efficient Cluster Head Election Algorithm for Client Mesh Networks using Fuzzy Logic Control. Journal of Internet Technology, 18 (5). pp. 1057-1067. ISSN 1607-9264. (Published)
Ahmed, Abdulghani Ali and Chua, Xue Li (2017) Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing. International Journal of Biotechnology and Bioengineering, 3 (2). p. 60. ISSN 2475-3432. (Published)
Ahmed, Abdulghani Ali and Nurul Amirah, Abdullah (2016) Real time detection of phishing websites. In: 7th IEEE Annual Information Technology, Electronics and Mobile Communication Conference, IEEE IEMCON 2016 , 13 - 15 October 2016 , Universtiy of British Columbia, Vancouver, Canada. pp. 1-6. (7746247). ISBN 9781509009961 (Published)
Ahmed, Abdulghani Ali and Sadiq, Ali Safa and Mohamad Fadli, Zolkipli (2016) Traceback Model for Identifying Sources of Distributed Attacks in Real Time. Security and Communication Networks, 9 (13). pp. 2173-2185. ISSN 1939-0122. (Published)
Ahmed, Abdulghani Ali (2015) Filtration Model For DDoS Attack Detection in Real-Time. International Journal of Software Engineering & Computer Sciences (IJSECS), 1. pp. 95-108. ISSN 2289-8522. (Published)
Ahmed, Abdulghani Ali and Aman, Jantan and Wan, Tat-Chee (2015) Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks. Computer Communications. ISSN 0140-3664. (In Press / Online First) (In Press / Online First)
Ahmed, Abdulghani Ali (2015) Investigation Model for Ddos Attack Detection in Real-Time. International Journal of Software Engineering & Computer Sciences (IJSECS), 1. pp. 93-105. ISSN 2289-8522. (Published)
F
Fahad, Ahmed Mohammed and Ahmed, Abdulghani Ali and Alghushami, Abdullah H. and Alani, Sammer (2019) Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method. In: Intelligent Computing & Optimization. Advances in Intelligent Systems and Computing, 866 . Springer Nature Switzerland, Berlin, Germany, pp. 46-55. ISBN 978-3-030-00979-3
Fahad, Ahmed Mohammed and Ahmed, Abdulghani Ali and M. N. M., Kahar (2019) Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing. In: ICO 2018: Intelligent Computing & Optimization. Advances in Intelligent Systems and Computing, 866 . Springer Nature, Switzerland, pp. 56-65. ISBN 978-3-030-00979-3
Fahad, Ahmed Mohammed and Ahmed, Abdulghani Ali and M. N. M., Kahar (2017) The importance of monitoring cloud computing: An intensive review. In: IEEE Region 10 Conference, TENCON 2017 , 5-8 November 2017 , Penang, Malaysia. pp. 2858-2863., 2017. ISBN 978-1-5090-1134-6 (Published)
K
Khalid, Abdulrahman and Ahmed, Abdulghani Ali and Mohammed, Muamer N. (2019) Investigation model for locating data remnants on cloud storage. In: ICO 2018: Intelligent Computing & Optimization , 4-5 October 2018 , Pattaya, Thailand. pp. 246-256., 866. ISBN 978-3-030-00979-3 (Published)
M
Montaser, Mohamed Mostafa and Ahmed, Abdulghani Ali (2018) RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion. Advanced Science Letters, 24 (10). p. 61. ISSN 1936-6612. (Published)
Muhammad Rizwan, Ghori and Ahmed, Abdulghani Ali (2018) Review of access control mechanisms in cloud computing. In: International PostGraduate Conference on Applied Science and Physics, GRASP 2017 , 7 December 2017 , UTHM Johor, Malaysia. pp. 1-9., 1049 (1). ISSN 1742-6588 (Print); 1742-6596 (Online) (Published)
N
Nik Quosthoni, Sunaidi and Ahmed, Abdulghani Ali (2018) Back Propagation Algorithm-Based Intelligent Model for Botnet Detection. Advanced Science Letters, 24 (10). pp. 7348-7354. ISSN 1936-6612. (Published)
S
Sallam, Amer A. and M. Nomani, Kabir and Ahmed, Abdulghani Ali and Farhan, Khalid and Tarek, Ethar (2019) Epilepsy detection from EEG signals using artificial neural network. In: International Conference on Intelligent Computing & Optimization. Advances in Intelligent Systems and Computing . Springer Singapore, Singapore, pp. 320-327. ISBN 978-3-030-00979-3
Sadiq, Ali Safa and Almohammad, Turfah Zeyad and Rabiatul Adawiah, Muhamed Khadri and Ahmed, Abdulghani Ali and Lloret, Jaime (2017) An Energy-Efficient Cross-Layer approach for cloud wireless green communications. In: Second International Conference on Fog and Mobile Edge Computing (FMEC) , 8-11 May 2017 , Valencia, Spain. pp. 230-234. (16963961). ISBN 978-1-5386-2859-1 (Published)
W
Wan Nurulsafawati, Wan Manan and Ahmed, Abdulghani Ali and M. N. M., Kahar (2019) Characterizing Current Features of Malicious Threats on Websites. In: Intelligent Computing & Optimization. International Conference on Intelligent Computing & Optimization: ICO 2018 , 4-5 October 2018 , Pattaya, Thailand. pp. 210-218., 866. ISBN 978-3-030-00979-3 (Published)