| Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach | Ahmed Aleroud and George Karabatis | IEEE Transactions on Systems, Man, and Cybernetics: Systems(ISI IF 1.60) | | IEEE | 2016 |
| Multimode co-clustering for analyzing terrorist networks | Ahmed AlEroud and Aryya Gangopadhyay | Information Systems Frontiers(ISI IF: 1.45) | | Springer | 2016 |
| Identifying Cyber-Attacks on Software Defined Networks: An Inference-based Intrusion Detection Appro | Ahmed Aleroud and Izzat Alsmadi | Journal of Network and Computer Applications (ISI, IF:2.331) | | Elsevier | 2016 |
| Contextual Information Fusion for Intrusion Detection: a Survey and Taxonomy | Ahmed Aleroud and George Karabatis | Knowledge and Information Systems (ISI, IF:1.70) | | Springer | 2016 |
| Context and Semantics for Detection of Cyber Attacks | Ahmed Aleroud and George Karabatis | Int. J. Information and Computer Security | | Inderscience Publishers | 2015 |
| A hybrid Approach to Detecting Alerts in e-mail messages | Qasem Al-Radaideh, Ahmed AlEroud, and E Al-Shawakfa | Journal of Information Science (ISI: IF:0.89) | | Sage | 2013 |
| Evaluating Google queries based on language preferences | A. AlEroud, M. AlRamahi, M. Al-Kabi, I. Alsmadi, and E. Al-Shawakfa. | Journal of Information Science (ISI IF:89) | | Sage | 2011 |
| Examining Web Search Trends across Arab Countries, | M. Al-Kabi; A. Wahbeh; A. Alsobeh; A. Al-Eroud; I. Alsmadi | Arabian Journal for Science and Engineering(ISI IF:0.72) | | Springer | 2012 |
| Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach | Ahmed AlEroud and George Karabatis | IEEE Transactions on Systems, Man, and Cybernetics: Systems | ---- | ---- | 2016 |
| Phishing environments, techniques, and countermeasures | AlEroud, Ahmed and Zhou, Lina | Comput. Secur | ---- | ---- | 2017 |
| Fault-based Testing for Discovering SQL Injection Vulnerabilities in Web Applications | Alsmadi, Izzat; Aleroud Ahmed, and Ahmad Saifan | International Journal of Information and Computer Security | ---- | ---- | 2019 |
| An efficient activity recognition framework: Toward privacy-sensitive health data sensing | Samarah, Samer, Mohammed Alzamil, Ahmed Aleroud | IEEE Access | ---- | ---- | 2018 |
| An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities | ---- | ---- | 55 | Journal of Information Security and Applications | 2020-09-26 00:00:00 |
| A Firewall-Adversarial Testing Approach for Software Defined Networks | ---- | ---- | 99 | ---- | 2021-01-15 00:00:00 |
| Automatic Bug Triage in Software Systems Using
Graph Neighborhood Relations for
Feature Augmentation | ---- | ---- | 7 | IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS | 2020-09-01 00:00:00 |
| "Anonymization of Network Traces Data through Condensation-based Differential Privacy." Digital Threats: Research and Practice (DTRAP) 2.4 (2021): 1-23. | Aleroud, Ahmed, et al. | Digital Threats: Research and Practice (DTRAP) | ---- | ---- | 2021 |