Abdulghani Ali

Orcid: 0000-0001-9748-6067

According to our database1, Abdulghani Ali authored at least 24 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams.
Sensors, 2023

2022
Deep learning-based classification model for botnet attack detection.
J. Ambient Intell. Humaniz. Comput., 2022

2021
Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing.
IEEE Syst. J., 2021

2020
Normal parameter reduction algorithm in soft set based on hybrid binary particle swarm and biogeography optimizer.
Neural Comput. Appl., 2020

Comprehensive Survey on Big Data Privacy Protection.
IEEE Access, 2020

Comprehensive Review of Cybercrime Detection Techniques.
IEEE Access, 2020

2018
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network.
J. Comput. Sci., 2018

Epilepsy Detection from EEG Signals Using Artificial Neural Network.
ICO, 2018

Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing.
ICO, 2018

Detection of Black Hole Attacks in Mobile Ad Hoc Networks via HSA-CBDS Method.
ICO, 2018

Investigation Model for Locating Data Remnants on Cloud Storage.
ICO, 2018

Collecting and Analyzing Digital Proof Material to Detect Cybercrimes.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Attack Intention Recognition: A Review.
Int. J. Netw. Secur., 2017

Investigation Approach for Network Attack Intention Recognition.
Int. J. Digit. Crime Forensics, 2017

An Energy-Efficient Cross-Layer approach for cloud wireless green communications.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

Detection and Avoidance Technique of Anomalous Congestion at the Network Gateways.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Traceback model for identifying sources of distributed attacks in real time.
Secur. Commun. Networks, 2016

Filtration model for the detection of malicious traffic in large-scale networks.
Comput. Commun., 2016

MICIE: A Model for Identifying and Collecting Intrusion Evidences.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

2013
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse.
J. Netw. Syst. Manag., 2013

Real-Time Detection of Intrusive Traffic in QoS Network Domains.
IEEE Secur. Priv., 2013

2011
SLA-based complementary approach for network intrusion detection.
Comput. Commun., 2011

2010
A Potent Model for Unwanted Traffic Detection in QoS Network Domain.
J. Digit. Content Technol. its Appl., 2010

2009
Honeybee-Based Model to Detect Intrusion.
Proceedings of the Advances in Information Security and Assurance, 2009


  Loading...