Dr. Abdulghani Ali Ahmed

Senior Lecturer
University Malaysia Pahang, Malaysia


Highest Degree
Ph.D. in Network Security from Universiti Sains Malaysia, Malaysia

Share this Profile

Area of Interest:

Computer Sciences
Computer Security
Digital Forensics
Cloud Computing
Network Security

Selected Publications

  1. Ahmed, A.A., 2017. Investigation approach for network attack intention recognition. Int. J. Digital Crime Forensics, 10.4018/IJDCF.2017010102.
    CrossRef  |  Direct Link  |  

  2. Ahmed, A.A. and N.A.K. Zaman, 2017. Attack intention recognition: A review. Int. J. Network Security, 19: 244-250.
    Direct Link  |  

  3. Ahmed, A.A. and N.A. Abdullah, 2017. Phishing websites detection based on uniform resource locator characteristics. J. Theor.Appl. Inf. Technol., .

  4. Ahmed, A.A. and C.X. Li, 2017. Analyzing data remnant remains on user devices to determine probative artifacts in cloud environment. J. Forensic Sci., 10.1111/1556-4029.13506.
    CrossRef  |  Direct Link  |  

  5. Ahmed, A.A., A. Safa and M. Fadli, 2016. Traceback model for identifying sources of distributed attacks in real time. Secur. Commun. Networks, 9: 2173-2185.
    CrossRef  |  Direct Link  |  

  6. Ahmed, A.A., A. Jantan, and T.C. Wan, 2016. Filtration model for the detection of malicious traffic in large-scale networks. Comput. Commun., 82: 59-70.
    CrossRef  |  Direct Link  |  

  7. Ahmed, A.A., 2015. Filtration model for ddos attack detection at real-time. Int. J. Software Eng. Comput. Sys., 1: 95-108.

  8. Jantan, A., O. Elejla and A.A. Ahmed, 2014. Three layers approach for network scanning detection. J. Theor. Appl. Inf. Technol., 64: 38-47.

  9. Jantan, A. and A.A. Ahmed, 2014. Honey bee intelligent model for network zero day attack detection. Int. J. Digital Content Technol., .
    Direct Link  |  

  10. Jantan ,A. and A.A. Ahmed, 2014. Honeybee protection system for detecting and preventing network attacks. J. Theor. Appl. Inf. Technol., 64: 38-47.
    Direct Link  |  

  11. Ahmed, A.A., A. Jantan and T.C. Wan, 2013. Real-time detection of intrusive traffic in QoS network domains. Browse J. Magazines, 99: 45-53.
    CrossRef  |  Direct Link  |  

  12. Ahmed, A.A., A. Jantan and M. Rasmi, 2013. Service violation monitoring model for detecting and tracing bandwidth abuse. J. Network Sys. Manage, 21: 218-237.
    Direct Link  |  

  13. Ahmed, A.A. A. Jantan and T.C. Wan, 2011. SLA-based complementary approach for network intrusion detection. Comput. Commun., 34: 1738-1749.
    Direct Link  |  

  14. Ahmed, A.A., A. Jantan and G.A. Ali, 2010. A potent model for unwanted traffic detection in qos network domain. Int. J. Digital Content Technol. Appl., 3: 122-130.
    Direct Link  |  

  15. Ali, G.A., A. Jantan and A.A. Ahmed, 2009. Honeybee-Based Model To Detect Intrusion. In: Advances In Information Security And Assurance, Ali, G.A., A. Jantan and A.A. Ahmed (Eds.)., Springer Berlin, Heidelberg, pp: 598-607.