Faeiz Alserhani

According to our database1, Faeiz Alserhani authored at least 12 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A fog-edge-enabled intrusion detection system for smart grids.
J. Cloud Comput., December, 2024

Transformative synergy: SSEHCET - bridging mobile edge computing and AI for enhanced eHealth security and efficiency.
J. Cloud Comput., December, 2024

2015
Knowledge-Based Model to Represent Security Information and Reason About Multi-stage Attacks.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2011
Implementation and Evaluation of Network Intrusion Detection Systems.
Proceedings of the Network Performance Engineering, 2011

Event-Based Alert Correlation System to Detect SQLI Activities.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
MARS: Multi-stage Attack Recognition System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

High Speed NIDS using Dynamic Cluster and Comparator Logic.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Virtualization in Network Intrusion Detection Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009

Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems.
Proceedings of the Information Security and Digital Forensics, 2009

Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment.
Proceedings of the Information Security and Digital Forensics, 2009

Empowered Certification Authority in VANETs.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Evaluating Intrusion Detection Systems in High Speed Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...