Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach | Ahmed Aleroud and George Karabatis | IEEE Transactions on Systems, Man, and Cybernetics: Systems(ISI IF 1.60) | | IEEE | 2016 |
Multimode co-clustering for analyzing terrorist networks | Ahmed AlEroud and Aryya Gangopadhyay | Information Systems Frontiers(ISI IF: 1.45) | | Springer | 2016 |
Identifying Cyber-Attacks on Software Defined Networks: An Inference-based Intrusion Detection Appro | Ahmed Aleroud and Izzat Alsmadi | Journal of Network and Computer Applications (ISI, IF:2.331) | | Elsevier | 2016 |
Contextual Information Fusion for Intrusion Detection: a Survey and Taxonomy | Ahmed Aleroud and George Karabatis | Knowledge and Information Systems (ISI, IF:1.70) | | Springer | 2016 |
Context and Semantics for Detection of Cyber Attacks | Ahmed Aleroud and George Karabatis | Int. J. Information and Computer Security | | Inderscience Publishers | 2015 |
A hybrid Approach to Detecting Alerts in e-mail messages | Qasem Al-Radaideh, Ahmed AlEroud, and E Al-Shawakfa | Journal of Information Science (ISI: IF:0.89) | | Sage | 2013 |
Evaluating Google queries based on language preferences | A. AlEroud, M. AlRamahi, M. Al-Kabi, I. Alsmadi, and E. Al-Shawakfa. | Journal of Information Science (ISI IF:89) | | Sage | 2011 |
Examining Web Search Trends across Arab Countries, | M. Al-Kabi; A. Wahbeh; A. Alsobeh; A. Al-Eroud; I. Alsmadi | Arabian Journal for Science and Engineering(ISI IF:0.72) | | Springer | 2012 |
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach | Ahmed AlEroud and George Karabatis | IEEE Transactions on Systems, Man, and Cybernetics: Systems | ---- | ---- | 2016 |
Phishing environments, techniques, and countermeasures | AlEroud, Ahmed and Zhou, Lina | Comput. Secur | ---- | ---- | 2017 |
Fault-based Testing for Discovering SQL Injection Vulnerabilities in Web Applications | Alsmadi, Izzat; Aleroud Ahmed, and Ahmad Saifan | International Journal of Information and Computer Security | ---- | ---- | 2019 |
An efficient activity recognition framework: Toward privacy-sensitive health data sensing | Samarah, Samer, Mohammed Alzamil, Ahmed Aleroud | IEEE Access | ---- | ---- | 2018 |
An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities | ---- | ---- | 55 | Journal of Information Security and Applications | 2020-09-26 00:00:00 |
A Firewall-Adversarial Testing Approach for Software Defined Networks | ---- | ---- | 99 | ---- | 2021-01-15 00:00:00 |
Automatic Bug Triage in Software Systems Using
Graph Neighborhood Relations for
Feature Augmentation | ---- | ---- | 7 | IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS | 2020-09-01 00:00:00 |
"Anonymization of Network Traces Data through Condensation-based Differential Privacy." Digital Threats: Research and Practice (DTRAP) 2.4 (2021): 1-23. | Aleroud, Ahmed, et al. | Digital Threats: Research and Practice (DTRAP) | ---- | ---- | 2021 |