Ahmed Ahmim

Orcid: 0000-0001-5519-8868

According to our database1, Ahmed Ahmim authored at least 14 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ESIKE: An Efficient and Secure Internet Key Exchange Protocol.
Wirel. Pers. Commun., 2023

Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Model.
IEEE Access, 2023

Intelligent Air Quality Monitoring System: A Comprehensive Review.
Proceedings of the Novel & Intelligent Digital Systems: Proceedings of the 3rd International Conference (NiDS 2023), 2023

2022
Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV".
Int. J. Inf. Sec., 2022

Lightweight Authentication Protocols for Internet of Vehicles: Network Model, Taxonomy and Challenges.
Proceedings of the 4th International Conference on Pattern Analysis and Intelligent Systems, 2022

2020
Intrusion detection using classification techniques: a comparative study.
Int. J. Data Min. Model. Manag., 2020

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.
Future Internet, 2020

2019
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

2018
An intrusion detection system based on combining probability predictions of a tree of classifiers.
Int. J. Commun. Syst., 2018

Intrusion Detection using Data Mining: A contemporary comparative study.
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018

2017
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network.
Telecommun. Syst., 2017

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2017

2015
A new hierarchical intrusion detection system based on a binary tree of classifiers.
Inf. Comput. Secur., 2015

2014
A new adaptive intrusion detection system based on the intersection of two different classifiers.
Int. J. Secur. Networks, 2014


  Loading...