Ali Hadi

According to our database1, Ali Hadi authored at least 13 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Modified Network DEA Model for Bank Efficiency Analysis Considering Risk Factors.
Oper. Res. Forum, December, 2024

2022
MR-VDENCLUE: Varying Density Clustering Using MapReduce.
Proceedings of the Intelligent Systems and Applications, 2022

2021
A pattern recognition model for static gestures in malaysian sign language based on machine learning techniques.
Comput. Electr. Eng., 2021

2020
Towards an Intelligent Intrusion Detection System: A Proposed Framework.
Proceedings of the Intelligent Computing, 2020

2019
Real-Time Remote-Health Monitoring Systems: a Review on Patients Prioritisation for Multiple-Chronic Diseases, Taxonomy Analysis, Concerns and Solution Procedure.
J. Medical Syst., 2019

Data Exfiltration Techniques and Data Loss Prevention System.
Proceedings of the International Arab Conference on Information Technology, 2019

2018
Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects.
J. Medical Syst., 2018

HDFS file operation fingerprints for forensic investigations.
Digit. Investig., 2018

2016
Covert Communication Using Port Knocking.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Windows Forensic Investigations Using PowerForensics Tool.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Reviewing and Evaluating Existing File Carving Techniques for JPEG Files.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
MLDED: Multi-layer Data Exfiltration Detection System.
Proceedings of the Fourth International Conference on Cyber Security, 2015


  Loading...