Tarem Ahmed

According to our database1, Tarem Ahmed authored at least 20 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm.
J. Netw. Comput. Appl., 2020

2019
Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Sonar-based SLAM Using Occupancy Grid Mapping and Dead Reckoning.
Proceedings of the TENCON 2018, 2018

A New Multi-Robot Search Algorithm Using Probabilistic Finite State Machine and Lennard-Jones Potential Function.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Anomaly Clustering Based on Correspondence Analysis.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2016
Taking meredith out of Grey's anatomy: Automating hospital ICU emergency signaling.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Learning Algorithms for Anomaly Detection from Images.
Int. J. Syst. Dyn. Appl., 2015

2014
Adaptive algorithms for automated intruder detection in surveillance networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Efficient and effective automated surveillance agents using kernel tricks.
Simul., 2013

SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems.
Int. J. Commun. Networks Inf. Secur., 2013

2012
Automated Intruder Detection from Image Sequences using Minimum Volume Sets.
Int. J. Commun. Networks Inf. Secur., 2012

PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2010
Real-Time Intruder Detection in Surveillance Networks Using Adaptive Kernel Methods.
Proceedings of IEEE International Conference on Communications, 2010

Flow Vector Prediction Using EM Algorithms.
Proceedings of IEEE International Conference on Communications, 2010

Flow Vector Prediction in Large IP Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Online Anomaly Detection Using KDE.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2007
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007


  Loading...