Mohiuddin Ahmed

According to our database1, Mohiuddin Ahmed authored at least 29 papers between 2002 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Reservoir-based network traffic stream summarization for anomaly detection.
Pattern Anal. Appl., 2018

2017
An Unsupervised Approach of Knowledge Discovery from Big Data in Social Network.
EAI Endorsed Trans. Scalable Information Systems, 2017

Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering.
IEEE Computer, 2017

Anomaly Detection on Big Data in Financial Markets.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
A survey of network anomaly detection techniques.
J. Network and Computer Applications, 2016

A survey of anomaly detection techniques in financial domain.
Future Generation Comp. Syst., 2016

2015
An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling.
EAI Endorsed Trans. Scalable Information Systems, 2015

An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2015

2014
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Heart Disease Diagnosis Using Co-clustering.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

A Novel Approach for Network Traffic Summarization.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

An Efficient Approach for Complex Data Summarization Using Multiview Clustering.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

2011
On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster
CoRR, 2011

Performance analysis of a highly available home agent in mobile networks.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

On the Performance of MPI-OpenMP on a 12 Nodes Multi-core Cluster.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
IPv6 mobility: performance evaluation of VoIP on MIPv6.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

MySQL performance analysis on a limited resource server: Fedora vs. Ubuntu Linux.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

A novel algorithm to prevent man in the middle attack in LAN environment.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

2009
Implementation and Performance Analysis of a Live Linux Cluster in a Dynamic Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

An Intelligent Data Dissemination System Under Publish/Subscribe Mechanism (abstract).
Proceedings of the Huntsville Simulation Conference, 2009

2007
Application of Quality Function Deployment in redesigning website: a case study on TV3.
IJBIS, 2007

Evaluating QoS performance of streaming video on both IPv4 and IPv6 protocols.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

2006
Developing quality healthcare software using quality function deployment: a case study based on Sultan Qaboos University Hospital.
IJBIS, 2006

Using computers as visual aids to enhance communication in therapy.
Computers in Human Behavior, 2006

2003
Protocols for Enhancing Gateway Dependability in Hybrid Mobile Ad Hoc Networks.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

2002
Trajectory control of mobile gateways for range extension in ad hoc networks.
Computer Networks, 2002

An architecture for providing range extension by deploying mobile gateways in ad hoc networks.
Proceedings of the 13th IEEE International Symposium on Personal, 2002


  Loading...