Ejaz Ahmed

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Evolving techniques in cyber threat hunting: A systematic review.
J. Netw. Comput. Appl., 2024

2023
VulMatch: Binary-level Vulnerability Detection Through Signature.
CoRR, 2023

DeepMPR: Enhancing Opportunistic Routing in Wireless Networks through Multi-Agent Deep Reinforcement Learning.
CoRR, 2023

Open Source-based Over-The-Air 5G New Radio Sidelink Testbed.
CoRR, 2023

DeepMPR: Enhancing Opportunistic Routing in Wireless Networks via Multi-Agent Deep Reinforcement Learning.
Proceedings of the IEEE Military Communications Conference, 2023

Open Source-Based Over-the-Air 5G New Radio Sidelink Testbed.
Proceedings of the IEEE Military Communications Conference, 2023

WinkFuzz: Model-based Script Synthesis for Fuzzing.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

2022
Automated Binary Analysis: A Survey.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

2021
Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for MANETs.
CoRR, 2021

DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

2019
Anti-malarial, cytotoxicity and molecular docking studies of quinolinyl chalcones as potential anti-malarial agent.
J. Comput. Aided Mol. Des., 2019

Robust Inference after Random Projections via Hellinger Distance for Location-Scale Family.
Entropy, 2019

2018
Cooperative Vehicular Networking: A Survey.
IEEE Trans. Intell. Transp. Syst., 2018

Recent advances in fog and mobile edge computing.
Trans. Emerg. Telecommun. Technol., 2018

2016
Analysis of factors influencing acceptance of personal, academic and professional development e-portfolios.
Comput. Hum. Behav., 2016

Investigating the influence of the most commonly used external variables of TAM on students' Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios.
Comput. Hum. Behav., 2016

The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2014
Poisoned GOOSE: Exploiting the GOOSE Protocol.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Object extraction from T2 weighted brain MR image using histogram based gradient calculation.
Pattern Recognit. Lett., 2013

2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012

2011
Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Use of IP Addresses for High Rate Flooding Attack Detection.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Risk Modelling the Transition of SCADA System to IPv6.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

A Distributed Denial of Service Testbed.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

2009
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.
Proceedings of the Identity and Privacy in the Internet Age, 2009

2008
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

2005
TCP-DR an Effective Protocol for Infrastructure based Wireless Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005


  Loading...