Iftikhar Ahmad

Orcid: 0000-0002-2381-3069

Affiliations:
  • King Saud University, Riyadh, Saudi Arabia
  • Universiti Teknologi PETRONAS, Bandar Seri Iskandar, Malaysia (former)


According to our database1, Iftikhar Ahmad authored at least 13 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Network forensics: Review, taxonomy, and open challenges.
J. Netw. Comput. Appl., 2016

2015
Feature Selection Using Particle Swarm Optimization in Intrusion Detection.
Int. J. Distributed Sens. Networks, 2015

A Review of Evaluation Methods and Techniques for Simulation Packages.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

2014
Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components.
Neural Comput. Appl., 2014

2013
Optimized intrusion detection mechanism using soft computing techniques.
Telecommun. Syst., 2013

2012
Reliable data deliveries using packet optimization in multi-hop underwater sensor networks.
J. King Saud Univ. Comput. Inf. Sci., 2012

2010
Comparative Analysis of Intrusion Detection Approaches.
Proceedings of the 12th UKSim, 2010

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Evaluating ESB for C4I Architecture Framework Using Analytic Hierarchy Process.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Remote to Local attack detection using supervised neural network.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Evaluating Encryption Techniques for C4I System.
Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, 2010

2009
Application of artificial neural network in detection of DOS attacks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009


  Loading...