Riyad Alshammari

According to our database1, Riyad Alshammari authored at least 27 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Encrypted Mobile Instant Messaging Traffic Dataset.
Dataset, May, 2023

Identification of stroke using deepnet machine learning algorithm.
Int. J. Medical Eng. Informatics, 2023

Instant Messaging Application Encrypted Traffic Generation System.
Proceedings of the NOMS 2023, 2023

Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones.
Proceedings of the NOMS 2023, 2023

Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

2021
An Improved Dense V-Network for Fast and Precise Segmentation of Left Atrium.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Predictors of outpatients' no-show: big data analytics using apache spark.
J. Big Data, 2020

2019
Collaborative Denoising Autoencoder for High Glycated Haemoglobin Prediction.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019 - 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17-19, 2019, Proceedings, 2019

Are There Bots even in FIFA World Cup 2018 Tweets?
Proceedings of the 15th International Conference on Network and Service Management, 2019

2018
Stacked Denoising Autoencoders for Mortality Risk Prediction Using Imbalanced Clinical Data.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Type-2 Diabetes Mellitus Diagnosis from Time Series Clinical Data Using Deep Learning Models.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

2015
How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?
J. Netw. Syst. Manag., 2015

Identification of VoIP encrypted traffic using a machine learning approach.
J. King Saud Univ. Comput. Inf. Sci., 2015

Building a Culture of Health Informatics Innovation and Entrepreneurship: A New Frontier.
Proceedings of the Enabling Health Informatics Applications [ICIMTH 2015, 2015

2014
Aligning Public Health and Health Informatics Research Strengths with National Level Research Priorities in Saudi Arabia.
Proceedings of the Integrating Information Technology and Management for Quality of Care [ICIMTH 2014, 2014

2012
The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
Comput. Networks, 2011

Is machine learning losing the battle to produce transportable signatures against VoIP traffic?
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

2010
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Unveiling Skype encrypted tunnels using GP.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Classifying SSH encrypted traffic with minimum packet header features using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Machine learning based encrypted traffic classification: Identifying SSH and Skype.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Generalization of signatures for SSH encrypted traffic identification.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Investigating Two Different Approaches for Encrypted Traffic Classification.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

2007
A flow based approach for SSH traffic detection.
Proceedings of the IEEE International Conference on Systems, 2007

Using Neuro-Fuzzy Approach to Reduce False Positive Alerts.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007


  Loading...