Ameer Al-Nemrat
According to our database1,
Ameer Al-Nemrat
authored at least 23 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Inf. Comput. Secur., 2023
2021
Int. J. Wirel. Inf. Networks, 2021
Foreword: Special Issue on Trends in Artificial Intelligence and Data Analytics for an Ethical and Inclusive Digitalized Society.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021
2019
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All.
Symmetry, 2019
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control.
IEEE Access, 2019
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data.
IEEE Access, 2019
2016
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Measuring sustainability for an effective Information System audit from public organization perspective.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
2014
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment.
J. Intell. Inf. Syst., 2014
2013
Int. J. Secur. Softw. Eng., 2013
Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013
2012
Analysis of firewall log-based detection scenarios for evidence in digital forensics.
Int. J. Electron. Secur. Digit. Forensics, 2012
Achieving Model Completeness for Hierarchally Structured Activities of Daily Life.
Proceedings of the PECCS 2012, 2012
Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012
2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
2010
Proceedings of the Global Security, Safety, and Sustainability, 2010