Ahmed Patel
According to our database1,
Ahmed Patel
authored at least 133 papers
between 1980 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks.
Clust. Comput., February, 2025
2023
J. Netw. Syst. Manag., July, 2023
VNDN-Fuzzy - A strategy to mitigate the forwarding interests broadcast storm problem in VNDN networks.
Proceedings of the International Conference on Information Networking, 2023
2020
Comput. Stand. Interfaces, 2020
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach.
Comput. Stand. Interfaces, 2020
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review.
Comput. Stand. Interfaces, 2020
2019
Inf. Comput. Secur., 2019
Investigating the Schedulability of Periodic Real-Time Tasks in Virtualized Cloud Environment.
IEEE Access, 2019
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019
A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019
BE-SYS: Big Data E-Health System for Analysis and Detection of Risk of Septic Shock in Adult Patients.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Alarm Mechanism for Anticipated Detection of Network Unavailability in IP Networks Through Time Series Analysis.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution.
Int. J. Electron. Secur. Digit. Forensics, 2017
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Comput. Secur., 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
Performance Management of Optical Transport Networks through Time Series Forecasting.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Comput. Stand. Interfaces, 2016
Comput. Stand. Interfaces, 2016
Comput. Stand. Interfaces, 2016
Comput. Electr. Eng., 2016
A dominance based rough set classification system for fault diagnosis in electrical smart grid environments.
Artif. Intell. Rev., 2016
2015
J. Intell. Fuzzy Syst., 2015
Comput. Secur., 2015
MBEEC: A bio-inspired routing protocol with multihop between cluster-heads for energy saving in WSN.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
2014
Int. Arab J. Inf. Technol., 2014
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.
Eng. Appl. Artif. Intell., 2014
Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy.
Comput. Stand. Interfaces, 2014
2013
An intrusion detection and prevention system in cloud computing: A systematic review.
J. Netw. Comput. Appl., 2013
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
Eng. Appl. Artif. Intell., 2013
Concurr. Comput. Pract. Exp., 2013
Accessibility algorithm based on site availability to enhance replica selection in a data grid environment.
Comput. Sci. Inf. Syst., 2013
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks.
Proceedings of the International Conference on Information Networking 2013, 2013
2012
Real-Time Curvature Defect Detection on Outer Surfaces Using Best-Fit Polynomial Interpolation.
Sensors, 2012
Inf. Manag. Comput. Secur., 2012
Int. J. Inf. Secur. Priv., 2012
An analysis of web proxy logs with query distribution pattern approach for search engines.
Comput. Stand. Interfaces, 2012
BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Networks, 2012
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Design of an Integrated Project Management Information System for Large Scale Public Projects: Iranian Case Study.
J. Inf. Technol. Res., 2011
Inf. Manag. Comput. Secur., 2011
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card.
Int. J. Inf. Secur. Priv., 2011
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs.
Int. J. Digit. Crime Forensics, 2011
Comput. Stand. Interfaces, 2011
Analytical model based on green criteria for optical backbone network interconnection.
Comput. Stand. Interfaces, 2011
Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
Inf. Manag. Comput. Secur., 2010
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems.
Inf. Manag. Comput. Secur., 2010
Proceedings of the South African Information Security Multi-Conference, 2010
2009
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols.
Int. J. Mob. Comput. Multim. Commun., 2009
A fast scheme for recovery of deleted files with evidential recording for digital forensics.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
2008
Comput. Stand. Interfaces, 2008
Comput. Stand. Interfaces, 2008
2007
Comput. Stand. Interfaces, 2007
Comput. Stand. Interfaces, 2007
2006
Comput. Commun., 2006
2005
Int. J. Digit. EVid., 2005
An automatic computing approach to developing secure, trusted and auditable services for e-business.
Comput. Syst. Sci. Eng., 2005
Comput. Stand. Interfaces, 2005
Comput. Stand. Interfaces, 2005
Comput. Stand. Interfaces, 2005
Design and Implementation of a Distributed Search and Advertising System.
Proceedings of the iiWAS'2005, 2005
2004
Digit. Investig., 2004
Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
Signal Propagation Delay as a Barrier to Control Applications in WAN.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
Distributed Search-Based Advertising on The Web.
Proceedings of the iiWAS'2004, 2004
2003
Comput. Stand. Interfaces, 2003
Comput. Stand. Interfaces, 2003
An application of the Reference Model for Open Distributed Processing to electronic brokerage.
Comput. Stand. Interfaces, 2003
Comput. Commun., 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Comparison of New Simple Weighting Functions for Web Documents against Existing Methods.
Proceedings of the Computer and Information Sciences, 2003
Ad Hoc Interface Evolution in Soap.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Simulation Based Approach to Evaluate a Distributed Search Engine.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Significance of HTML Tags for Document Indexing and Retrieval.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Effects of Ordered Access Lists in Firewalls.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2003
Analyzing Dynamic Memory Allocation in Embedded Systems for Multi-Channel Modems.
Proceedings of the International Conference on Communications in Computing, 2003
2002
Electron. Commer. Res., 2002
Using Tree Automata and Regular Expressions to Manipulate Hierarchically Structured Data
CoRR, 2002
Current status and future directions of software architectures for telecommunications.
Comput. Commun., 2002
2001
IEEE Internet Comput., 2001
Comput. Stand. Interfaces, 2001
Proceedings of the 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 2001
2000
Decis. Support Syst., 2000
1999
Proceedings of the Intelligence in Services and Networks, 1999
Proceedings of the Intelligence in Services and Networks, 1999
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999
Security On ATM Networks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
1998
Int. J. Netw. Manag., 1998
Managing automated electronic document delivery using the ISO interlibrary loan protocol over TCP/IP.
Comput. Stand. Interfaces, 1998
1997
Design and Implementation of an SNMPv2 Management System for MS-DOS/Novell NetWare and Unix-TCP/IP.
Int. J. Netw. Manag., 1997
Comput. Stand. Interfaces, 1997
Comput. Commun., 1997
1996
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996
Comput. Stand. Interfaces, 1996
An attack detection system for secure computer systems - design of the ADS.
Proceedings of the Information Systems Security, 1996
1995
Design and Implementation of a Composite Performance Evaluation Model for Heterogeneous Network Management Applications.
Int. J. Netw. Manag., 1995
A critical analysis of the DESSERT information model.
Proceedings of the Integrated Network Management IV, 1995
1994
1993
High Level Generic Design of an ISDN Programming Communications Interface (PCI) for EuroISDN.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993
Managing Heterogeneous Networks: Integrator-Based Approach.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993
1991
1990
Comput. Commun., 1990
The principles of computer networking: D Russell <i>Cambridge University Press, UK (1989), ISBN 0-521-33992-8, 513 pp</i>.
Comput. Commun., 1990
1988
1986
The AMIGO Project: advanced group communication model for computer-based communications environment.
Proceedings of the CSCW '86, 1986
1980
Softw. Pract. Exp., 1980