Ibrahim Ghafir

Orcid: 0000-0003-3702-3866

According to our database1, Ibrahim Ghafir authored at least 34 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Latent Semantic Analysis and Graph Theory for Alert Correlation: A Proposed Approach for IoT Botnet Detection.
IEEE Open J. Commun. Soc., 2024

Extended water wave optimization (EWWO) technique: a proposed approach for task scheduling in IoMT and healthcare applications.
Evol. Intell., 2024

Performance Comparison of Machine Learning Algorithms for Keratoconus Detection.
Proceedings of the 30th IEEE International Conference on Telecommunications, 2024

Non-Negative Matrix Factorisation for Feature Selection: A Proposed Approach for the Detection of Multi-Stage Attacks.
Proceedings of the 14th International Conference on Advanced Computer Information Technologies, 2024

Latent Semantic Analysis for Feature Selection: A Proposed Approach for Anomaly Detection in Network Traffic.
Proceedings of the 14th International Conference on Advanced Computer Information Technologies, 2024

Navigating IoT Security Assessment: Current Methods, Challenges and Future Directions.
Proceedings of the 14th International Conference on Advanced Computer Information Technologies, 2024

2023
Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks.
IEEE Trans. Ind. Informatics, 2023

Machine Learning for Malware Detection in Network Traffic.
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023

Sequential Pattern Mining: A Proposed Approach for Intrusion Detection Systems.
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023

Latent Dirichlet Allocation for the Detection of Multi-Stage Attacks.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Multi-stage Attack Detection: Emerging Challenges for Wireless Networks.
Proceedings of the International Conference on Smart Applications, 2022

2021
Denial of service detection using dynamic time warping.
Int. J. Netw. Manag., 2021

Aerial Wireless Networks: Proposed Solution for Coverage Optimisation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Machine Learning for Botnet Detection: An Optimized Feature Selection Approach.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

2020
Coverage Optimisation for Aerial Wireless Networks.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

2019
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Sensors, 2019

Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats.
IEEE Access, 2019

Anomaly-Based Network Intrusion Detection Using SVM.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Anomaly Detection Using Dynamic Time Warping.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
Security threats to critical infrastructure: the human factor.
J. Supercomput., 2018

Defending against the advanced persistent threat: Detection of disguised executable files.
PeerJ Prepr., 2018

Detection of advanced persistent threat using machine-learning correlation analysis.
Future Gener. Comput. Syst., 2018

BotDet: A System for Real Time Botnet Command and Control Traffic Detection.
IEEE Access, 2018

A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection.
IEEE Access, 2018

Multi-Stage Attack Detection Using Contextual Information.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

2017
A machine-learning-based system for real-time advanced persistent threat detection and prediction.
PhD thesis, 2017

Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat.
PeerJ Prepr., 2017

An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processes.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

2016
A Survey on Network Security Monitoring Systems.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Social Engineering Attack Strategies and Defence Approaches.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016


  Loading...