Ahmed Patel

According to our database1, Ahmed Patel authored at least 133 papers between 1980 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks.
Clust. Comput., February, 2025

2023
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN).
J. Netw. Syst. Manag., July, 2023

VNDN-Fuzzy - A strategy to mitigate the forwarding interests broadcast storm problem in VNDN networks.
Proceedings of the International Conference on Information Networking, 2023

2020
An extended software defined optical networks slicing architecture.
Comput. Stand. Interfaces, 2020

Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach.
Comput. Stand. Interfaces, 2020

Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review.
Comput. Stand. Interfaces, 2020

2019
A review of security assessment methodologies in industrial control systems.
Inf. Comput. Secur., 2019

Investigating the Schedulability of Periodic Real-Time Tasks in Virtualized Cloud Environment.
IEEE Access, 2019

Securing IPv6 Wireless Networks Against Malicious Router Advertisements.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

BE-SYS: Big Data E-Health System for Analysis and Detection of Risk of Septic Shock in Adult Patients.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
IoT Device Programmable Language Customization for Home Automation.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Alarm Mechanism for Anticipated Detection of Network Unavailability in IP Networks Through Time Series Analysis.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution.
Int. J. Electron. Secur. Digit. Forensics, 2017

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Comput. Secur., 2017

SONA: Software Defined Optical Networks Slicing Architecture.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Performance Management of Optical Transport Networks through Time Series Forecasting.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Empirical evaluation of the link and content-based focused Treasure-Crawler.
Comput. Stand. Interfaces, 2016

A focused crawler combinatory link and content model based on T-Graph principles.
Comput. Stand. Interfaces, 2016

A systematic technical survey of DTN and VDTN routing protocols.
Comput. Stand. Interfaces, 2016

Document Selection in a Distributed Search Engine Architecture.
CoRR, 2016

An unfair semi-greedy real-time multiprocessor scheduling algorithm.
Comput. Electr. Eng., 2016

A dominance based rough set classification system for fault diagnosis in electrical smart grid environments.
Artif. Intell. Rev., 2016

2015
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network.
J. Intell. Fuzzy Syst., 2015

Rapid lossless compression of short text messages.
Comput. Stand. Interfaces, 2015

A novel methodology towards a trusted environment in mashup web applications.
Comput. Secur., 2015

MBEEC: A bio-inspired routing protocol with multihop between cluster-heads for energy saving in WSN.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Strategy to reduce false alarms in intrusion detection and prevention systems.
Int. Arab J. Inf. Technol., 2014

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.
Eng. Appl. Artif. Intell., 2014

Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy.
Comput. Stand. Interfaces, 2014

2013
An intrusion detection and prevention system in cloud computing: A systematic review.
J. Netw. Comput. Appl., 2013

An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
Eng. Appl. Artif. Intell., 2013

Using latency as a QoS indicator for global cloud computing services.
Concurr. Comput. Pract. Exp., 2013

Accessibility algorithm based on site availability to enhance replica selection in a data grid environment.
Comput. Sci. Inf. Syst., 2013

Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks.
Proceedings of the International Conference on Information Networking 2013, 2013

2012
Real-Time Curvature Defect Detection on Outer Surfaces Using Best-Fit Polynomial Interpolation.
Sensors, 2012

An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System.
Inf. Manag. Comput. Secur., 2012

Critical Evaluation of RFID Security Protocols.
Int. J. Inf. Secur. Priv., 2012

Safety Measures for Social Computing in Wiki Learning Environment.
Int. J. Inf. Secur. Priv., 2012

An analysis of web proxy logs with query distribution pattern approach for search engines.
Comput. Stand. Interfaces, 2012

BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Evaluation of Cheating Detection Methods in Academic Writings.
Libr. Hi Tech, 2011

Design of an Integrated Project Management Information System for Large Scale Public Projects: Iranian Case Study.
J. Inf. Technol. Res., 2011

Design of Secure and Trustworthy Mobile Agent-based E-marketplace System.
Inf. Manag. Comput. Secur., 2011

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card.
Int. J. Inf. Secur. Priv., 2011

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs.
Int. J. Digit. Crime Forensics, 2011

Application of structured document parsing to focused web crawling.
Comput. Stand. Interfaces, 2011

Analytical model based on green criteria for optical backbone network interconnection.
Comput. Stand. Interfaces, 2011

Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Block-based programming approach: challenges and benefits.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011

Whip: A framework for mashup development with block-based development approach.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011

Assessing Measurements of QoS for Global Cloud Computing Services.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
myKarve: JPEG Image and Thumbnail Carver.
J. Digit. Forensic Pract., 2010

A survey of intrusion detection and prevention systems.
Inf. Manag. Comput. Secur., 2010

A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems.
Inf. Manag. Comput. Secur., 2010

Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols.
Int. J. Mob. Comput. Multim. Commun., 2009

A fast scheme for recovery of deleted files with evidential recording for digital forensics.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

2008
A partial equilibrium view on security and privacy.
Inf. Manag. Comput. Secur., 2008

Frameworks for secure, forensically safe and auditable applications.
Comput. Stand. Interfaces, 2008

Secure and auditable agent-based e-marketplace framework for mobile users.
Comput. Stand. Interfaces, 2008

2007
An open source forensic tool to visualize digital evidence.
Comput. Stand. Interfaces, 2007

Evaluation of service management algorithms in a distributed web search system.
Comput. Stand. Interfaces, 2007

2006
Applying 4-regular grid structures in large-scale access networks.
Comput. Commun., 2006

2005
Formalising Event Time Bounding in Digital Investigations.
Int. J. Digit. EVid., 2005

An automatic computing approach to developing secure, trusted and auditable services for e-business.
Comput. Syst. Sci. Eng., 2005

Formal methods, techniques and tools for secure and reliable applications.
Comput. Stand. Interfaces, 2005

A service-centric model for intrusion detection in next-generation networks.
Comput. Stand. Interfaces, 2005

Evidence processing and privacy issues in evidence-based reputation systems.
Comput. Stand. Interfaces, 2005

Design and Implementation of a Distributed Search and Advertising System.
Proceedings of the iiWAS'2005, 2005

2004
Finite state machine approach to digital event reconstruction.
Digit. Investig., 2004

Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Signal Propagation Delay as a Barrier to Control Applications in WAN.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Distributed Search-Based Advertising on The Web.
Proceedings of the iiWAS'2004, 2004

2003
Rule-driven processing of tree-structured data using pointed trees.
Comput. Stand. Interfaces, 2003

CORBA: protocols, applications, process models and standards.
Comput. Stand. Interfaces, 2003

An application of the Reference Model for Open Distributed Processing to electronic brokerage.
Comput. Stand. Interfaces, 2003

Special issue: securing computer communications with Public Key Infrastructure.
Comput. Commun., 2003

Evaluating Database Selection Algorithms for Distributed Search.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Comparison of New Simple Weighting Functions for Web Documents against Existing Methods.
Proceedings of the Computer and Information Sciences, 2003

Ad Hoc Interface Evolution in Soap.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

Simulation Based Approach to Evaluate a Distributed Search Engine.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

Significance of HTML Tags for Document Indexing and Retrieval.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

Effects of Ordered Access Lists in Firewalls.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

Web Document Indexing and Retrieval.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2003

Analyzing Dynamic Memory Allocation in Embedded Systems for Multi-Channel Modems.
Proceedings of the International Conference on Communications in Computing, 2003

2002
An External Broker Interface Based on Existing Trading Protocols.
Electron. Commer. Res., 2002

Using Tree Automata and Regular Expressions to Manipulate Hierarchically Structured Data
CoRR, 2002

Current status and future directions of software architectures for telecommunications.
Comput. Commun., 2002

2001
A Topic-Specific Web Robot Model Based on Restless Bandits.
IEEE Internet Comput., 2001

Access control mechanisms in digital library services.
Comput. Stand. Interfaces, 2001

Independent Proprietorship and Competition in Distributed Web Search.
Proceedings of the 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 2001

2000
An inclusive and extensible architecture for electronic brokerage.
Decis. Support Syst., 2000

The impact of forensic computing on telecommunications.
IEEE Commun. Mag., 2000

1999
Building Topic-Specific Collections with Intelligent Agents.
Proceedings of the Intelligence in Services and Networks, 1999

Open Architecture for Distributed Search Systems.
Proceedings of the Intelligence in Services and Networks, 1999

An Inclusive and Extensible Architecture for Electronic Brokerage.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Security On ATM Networks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

1998
A functional model of cooperative system management.
Int. J. Netw. Manag., 1998

Requirements and the concept of cooperative system management.
Int. J. Netw. Manag., 1998

Managing automated electronic document delivery using the ISO interlibrary loan protocol over TCP/IP.
Comput. Stand. Interfaces, 1998

Cracking RC5 with Java applets.
Concurr. Pract. Exp., 1998

Intelligent Agent for Collaborative Diagnosis.
Proceedings of the MEDINFO '98, 1998

1997
Design and Implementation of an SNMPv2 Management System for MS-DOS/Novell NetWare and Unix-TCP/IP.
Int. J. Netw. Manag., 1997

Developing a multistack ISO-SR/Z39.50 application gateway.
Comput. Stand. Interfaces, 1997

Performance analysis of an HDLC-based protocol with data compression.
Comput. Commun., 1997

A technique for multi-network access to multimedia messages.
Comput. Commun., 1997

1996
Network Security Guidelines for Health Care Management.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

Issues of Security and Network Security in Health Care Information Systems.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996

Information modelling for service provisioning -- the DESSERT experience.
Comput. Stand. Interfaces, 1996

The need for an advanced ATM signalling protocol.
Comput. Stand. Interfaces, 1996

An attack detection system for secure computer systems - design of the ADS.
Proceedings of the Information Systems Security, 1996

1995
Design and Implementation of a Composite Performance Evaluation Model for Heterogeneous Network Management Applications.
Int. J. Netw. Manag., 1995

A critical analysis of the DESSERT information model.
Proceedings of the Integrated Network Management IV, 1995

1994
A Generic Management System for Heterogeneous Networks.
Int. J. Netw. Manag., 1994

A Database Handler (DBH) for broadband network administration.
Comput. Commun., 1994

Security management for OSI networks.
Comput. Commun., 1994

1993
Editorial.
Comput. Commun., 1993

Information services: an overview.
Comput. Commun., 1993

Cooperative decision support for medical diagnosis.
Comput. Commun., 1993

High Level Generic Design of an ISDN Programming Communications Interface (PCI) for EuroISDN.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993

Managing Heterogeneous Networks: Integrator-Based Approach.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993

1991
Focused interfaces for end-user network management.
Comput. Commun., 1991

1990
Introduction to names, addresses and routes in an OSI environment.
Comput. Commun., 1990

Network management issues in support of X.32 services.
Comput. Commun., 1990

The principles of computer networking: D Russell <i>Cambridge University Press, UK (1989), ISBN 0-521-33992-8, 513 pp</i>.
Comput. Commun., 1990

1988
Electronic directory services.
Comput. Commun., 1988

1986
Communication network protocols.
Comput. Commun., 1986

The Design of a Small Packet-Switching Node.
Comput. Networks, 1986

The AMIGO Project: advanced group communication model for computer-based communications environment.
Proceedings of the CSCW '86, 1986

1980
Systems Programming for Data Communications on Minicomputers.
Softw. Pract. Exp., 1980


  Loading...