Dr. Abdulghani  Ali Ahmed
My Social Links

Dr. Abdulghani Ali Ahmed

Senior Lecturer
University Malaysia Pahang, Malaysia


Highest Degree
Ph.D. in Network Security from Universiti Sains Malaysia, Malaysia

Share this Profile

Area of Interest:

Computer Sciences
100%
Computer Security
62%
Digital Forensics
90%
Cloud Computing
75%
Network Security
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
15
Abstracts
0

Selected Publications

  1. Ahmed, A.A., 2017. Investigation approach for network attack intention recognition. Int. J. Digital Crime Forensics, 10.4018/IJDCF.2017010102.
    CrossRef  |  Direct Link  |  
  2. Ahmed, A.A. and N.A.K. Zaman, 2017. Attack intention recognition: A review. Int. J. Network Security, 19: 244-250.
    Direct Link  |  
  3. Ahmed, A.A. and N.A. Abdullah, 2017. Phishing websites detection based on uniform resource locator characteristics. J. Theor.Appl. Inf. Technol., .
  4. Ahmed, A.A. and C.X. Li, 2017. Analyzing data remnant remains on user devices to determine probative artifacts in cloud environment. J. Forensic Sci., 10.1111/1556-4029.13506.
    CrossRef  |  Direct Link  |  
  5. Ahmed, A.A., A. Safa and M. Fadli, 2016. Traceback model for identifying sources of distributed attacks in real time. Secur. Commun. Networks, 9: 2173-2185.
    CrossRef  |  Direct Link  |  
  6. Ahmed, A.A., A. Jantan, and T.C. Wan, 2016. Filtration model for the detection of malicious traffic in large-scale networks. Comput. Commun., 82: 59-70.
    CrossRef  |  Direct Link  |  
  7. Ahmed, A.A., 2015. Filtration model for ddos attack detection at real-time. Int. J. Software Eng. Comput. Sys., 1: 95-108.
  8. Jantan, A., O. Elejla and A.A. Ahmed, 2014. Three layers approach for network scanning detection. J. Theor. Appl. Inf. Technol., 64: 38-47.
  9. Jantan, A. and A.A. Ahmed, 2014. Honey bee intelligent model for network zero day attack detection. Int. J. Digital Content Technol., .
    Direct Link  |  
  10. Jantan ,A. and A.A. Ahmed, 2014. Honeybee protection system for detecting and preventing network attacks. J. Theor. Appl. Inf. Technol., 64: 38-47.
    Direct Link  |  
  11. Ahmed, A.A., A. Jantan and T.C. Wan, 2013. Real-time detection of intrusive traffic in QoS network domains. Browse J. Magazines, 99: 45-53.
    CrossRef  |  Direct Link  |  
  12. Ahmed, A.A., A. Jantan and M. Rasmi, 2013. Service violation monitoring model for detecting and tracing bandwidth abuse. J. Network Sys. Manage, 21: 218-237.
    Direct Link  |  
  13. Ahmed, A.A. A. Jantan and T.C. Wan, 2011. SLA-based complementary approach for network intrusion detection. Comput. Commun., 34: 1738-1749.
    Direct Link  |  
  14. Ahmed, A.A., A. Jantan and G.A. Ali, 2010. A potent model for unwanted traffic detection in qos network domain. Int. J. Digital Content Technol. Appl., 3: 122-130.
    Direct Link  |  
  15. Ali, G.A., A. Jantan and A.A. Ahmed, 2009. Honeybee-Based Model To Detect Intrusion. In: Advances In Information Security And Assurance, Ali, G.A., A. Jantan and A.A. Ahmed (Eds.)., Springer Berlin, Heidelberg, pp: 598-607.