Ahmed AlEroud

According to our database1, Ahmed AlEroud authored at least 30 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Fault-based testing for discovering SQL injection vulnerabilities in web applications.
Int. J. Inf. Comput. Secur., 2021

Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Identifying GDPR Privacy Violations Using an Augmented LSTM: Toward an AI-based Violation Alert Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Generating Optimal Attack Paths in Generative Adversarial Phishing.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
Automatic Bug Triage in Software Systems Using Graph Neighborhood Relations for Feature Augmentation.
IEEE Trans. Comput. Soc. Syst., 2020

An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities.
J. Inf. Secur. Appl., 2020

A graph proximity feature augmentation approach for identifying accounts of terrorists on twitter.
Comput. Secur., 2020

Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

2019
A Hybrid Pre-Post Constraint-Based Framework for Discovering Multi-Dimensional Association Rules Using Ontologies.
Int. J. Inf. Technol. Web Eng., 2019

A reliable route repairing scheme for internet of vehicles.
Int. J. Comput. Appl. Technol., 2019

SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Workshops, 2019

2018
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Multimode co-clustering for analyzing terrorist networks.
Inf. Syst. Frontiers, 2018

2017
Contextual information fusion for intrusion detection: a survey and taxonomy.
Knowl. Inf. Syst., 2017

Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach.
J. Netw. Comput. Appl., 2017

Phishing environments, techniques, and countermeasures: A survey.
Comput. Secur., 2017

An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing.
IEEE Access, 2017

Methods and techniques to identify security incidents using domain knowledge and contextual information.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

2016
Beyond data: contextual information fusion for cyber security analytics.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

2015
Multi-granular aggregation of network flows for security analysis.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

2014
Context and semantics for detection of cyber attacks.
Int. J. Inf. Comput. Secur., 2014

Context Infusion in Semantic Link Networks to Detect Cyber-attacks: A Flow-Based Detection Approach.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

Detecting Zero-Day Attacks Using Contextual Relations.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

2013
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

2012
A hybrid approach to detecting alerts in Arabic e-mail messages.
J. Inf. Sci., 2012

Evaluating Rule-Based and Statistical Filters to Detecting Arabic E-Mail Alert Messages.
Int. J. Comput. Process. Orient. Lang., 2012

A System for Cyber Attack Detection Using Contextual Semantics.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Evaluating Google queries based on language preferences.
J. Inf. Sci., 2011


  Loading...