Wasim Alhamdani

Orcid: 0000-0003-3249-6883

Affiliations:
  • University of the Cumberlands, Department of Computer Information Sciences, Williamsburg, KY, USA


According to our database1, Wasim Alhamdani authored at least 26 papers between 1984 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Zero-day attack detection: a systematic literature review.
Artif. Intell. Rev., October, 2023

2022
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks.
J. Inf. Secur. Appl., 2022

A comprehensive deep learning benchmark for IoT IDS.
Comput. Secur., 2022

Towards building data analytics benchmarks for IoT intrusion detection.
Clust. Comput., 2022

A Proposed Harmony Search Algorithm for Honeyword Generation.
Adv. Hum. Comput. Interact., 2022

2021
Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark.
Future Internet, 2021

2020
Voice Feature Learning using Convolutional Neural Networks Designed to Avoid Replay Attacks.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

2014
Secure key management in cloud computing.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Network risk assessment base on multi-core processor architecture.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

2013
Retained-Key Encryption.
Int. J. Interdiscip. Telecommun. Netw., 2013

Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

Google Privacy: Something for Nothing?
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

2012
Lightening in a bottle: usable and secure.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

System evaluation lifecycle: chasing windmills.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

2011
PKI and access control in office environments.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

Measures to improve security in a microkernel operating system.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

Who can you trust in the cloud?: a review of security issues within cloud computing.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

Is RFID technology secure and private?
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

Elliptic curve for data protection.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

2010
XML security in healthcare web systems.
Proceedings of the Information Security Curriculum Development Conference, 2010

Cryptography based access control in healthcare web systems.
Proceedings of the Information Security Curriculum Development Conference, 2010

2009
Three Models to Measure Information Security Compliance.
Int. J. Inf. Secur. Priv., 2009

2007
Education Organization Baseline Control Protection and Trusted Level Security.
J. Digit. Forensics Secur. Law, 2007

2006
Assessment of need and method of delivery for information security awareness program.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

Knowledge flow with information assurance track.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

1984
Computer architecture description and algorithms.
PhD thesis, 1984


  Loading...