Ameer Al-Nemrat

According to our database1, Ameer Al-Nemrat authored at least 23 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The impact of GDPR infringement fines on the market value of firms.
Inf. Comput. Secur., 2023

2021
Introduction to Special Issue on Future of Wireless Communication and 6G Networks.
Int. J. Wirel. Inf. Networks, 2021

Foreword: Special Issue on Trends in Artificial Intelligence and Data Analytics for an Ethical and Inclusive Digitalized Society.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

2019
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All.
Symmetry, 2019

Deep Learning Approach for Intelligent Intrusion Detection System.
IEEE Access, 2019

A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control.
IEEE Access, 2019

Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data.
IEEE Access, 2019

2016
Fast authentication in wireless sensor networks.
Future Gener. Comput. Syst., 2016

Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Intelligent detection of MAC spoofing attack in 802.11 network.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

2015
ARP Cache Poisoning Mitigation and Forensics Investigation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Measuring sustainability for an effective Information System audit from public organization perspective.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015

An Analysis of Honeypot Programs and the Attack Data Collected.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

2014
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment.
J. Intell. Inf. Syst., 2014

2013
Analyzing Human Factors for an Effective Information Security Management System.
Int. J. Secur. Softw. Eng., 2013

Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013

2012
Analysis of firewall log-based detection scenarios for evidence in digital forensics.
Int. J. Electron. Secur. Digit. Forensics, 2012

Achieving Model Completeness for Hierarchally Structured Activities of Daily Life.
Proceedings of the PECCS 2012, 2012

Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
Sufficiency of Windows Event Log as Evidence in Digital Forensics.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Visualizing Variability Models Using Hyperbolic Trees.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
Cybercrime Victimisations/Criminalisation and Punishment.
Proceedings of the Global Security, Safety, and Sustainability, 2010


  Loading...