Ali Ahmed

Orcid: 0000-0002-7370-3044

Affiliations:
  • Victoria University of Wellington, Wellington, New Zealand
  • Imam Muhammad Ibn Saud Islamic University, Riyadh, Saudi Arabia (since 2013)
  • Monash University Malaysia Campus, Bandar Sunway, Selangor, Malaysia (2011 - 2013)
  • University of Manchester, UK (PhD 2010)


According to our database1, Ali Ahmed authored at least 22 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Smart Home Privacy: A Scoping Review.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Exploring the Transformative Potential of Virtual Reality in History Education: A Scoping Review.
Proceedings of the Advances in Web-Based Learning - ICWL 2023, 2023

2022
Reflections on Agile Software Development: A Conversion Master Case study.
Proceedings of the IEEE Frontiers in Education Conference, 2022

2021
Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Online Student Supervision: A Reflective Study on Lessons and Challenges.
Proceedings of the IEEE Frontiers in Education Conference, 2021

Signature-based and Machine-Learning-based Web Application Firewalls: A Short Survey.
Proceedings of the Fifth International Conference On Arabic Computational Linguistics, 2021

2020
LAMCO: A Layered Approach to Mobile Application Computation Offloading.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Teaching Cyber-Security for Distance Learners: A Reflective Study.
Proceedings of the IEEE Frontiers in Education Conference, 2020

On the Evaluation of the Security Usability of Bitcoin's APIs.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

PrivDRM: A Privacy-preserving Secure Digital Right Management System.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
Interdisciplinary Agile Teaching.
Proceedings of the IEEE Frontiers in Education Conference, 2019

2017
A Security Architecture for the Internet of Things.
KSII Trans. Internet Inf. Syst., 2017

Internet of Things: An end-to-end security layer.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
The Digital Privacy Laws and Practices in the Jersey Island.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

2015
Software Engineering for Security as a Non-functional Requirement.
Proceedings of the Intelligent Data Analysis and Applications, 2015

IPv6 Adoption in the Kingdom of Saudi Arabia.
Proceedings of the Intelligent Data Analysis and Applications, 2015

The School Absenteeism Contributing Factors: Oman as a Case Study.
Proceedings of the Intelligent Data Analysis and Applications, 2015

A metric for Literature-Based Discovery methodology evaluation.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2010
Towards the realisation of context-risk-aware access control in pervasive computing.
Telecommun. Syst., 2010

An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

2008
A Context-Risk-Aware Access Control model for Ubiquitous environments.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008


  Loading...