Follow
Mohiuddin Ahmed
Mohiuddin Ahmed
Senior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior Member
Verified email at ecu.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of network anomaly detection techniques
M Ahmed, A Mahmood, J Hu
Journal of Network and Computer Applications 60, 19-31, 2016
16052016
The k-means Algorithm: A Comprehensive Survey and Performance
M Ahmed, R Seraj, SMS Islam
Electronics 9 (8), 1-12, 2020
831*2020
A survey of anomaly detection techniques in financial domain
M Ahmed, A Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
5772016
Explainable artificial intelligence approaches: A survey
SR Islam, W Eberle, SK Ghafoor, M Ahmed
arXiv preprint arXiv:2101.09429, 2021
1292021
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure
M Ahmed, ASK Pathan
Complex Adaptive Systems Modeling 8 (4), 1-14, 2020
1162020
A Novel Approach for Outlier Detection and Clustering Improvement
M Ahmed, A Mahmood
8th IEEE International Conference on Industrial Electronics and Applications …, 2013
972013
Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making
J Yang, MM Hassan, NY Lee, M Ahmed, CS Kim
Applied Sciences 9 (7), 2019
922019
Data summarization: a survey
M Ahmed
Knowledge and Information Systems, 1-25, 2018
922018
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection
M Ahmed, A Mahmood
Annals of Data Science, 2015
842015
Biometrics for Internet-of-Things Security: A Review
W Yang, S Wang, NM Sahri, N Karie, M Ahmed, C Valli
Sensors 21 (18), 1-26, 2021
792021
Anomaly Detection on Big Data in Financial Markets
M Ahmed, N Choudhury, S Uddin
2017 IEEE/ACM International Conference on Advances in Social Networks …, 2017
662017
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems
M Ahmed, A Anwar, A Mahmood, Z Shah, MJ Maher
Transactions on Industrial Networks and Intelligent Systems 15 (3), 1-16, 2015
66*2015
Toward a Sustainable Cybersecurity Ecosystem
S Sadik, M Ahmed, LF Sikos, AKMN Islam
Computers 9 (3), 1-17, 2020
572020
Network Traffic Analysis based on Collective Anomaly Detection
M Ahmed, A Mahmood
9th IEEE International Conference on Industrial Electronics and Applications …, 2014
532014
False Data Injection Attacks in Internet of Things
B Bostami, M Ahmed, S Choudhury
Performability in Internet of Things, 47-58, 2018
512018
A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET
AFMS Akhter, M Ahmed, AFMS Shah, A Anwar, A Zengin
Sustainability 13 (1), 1-25, 2021
502021
Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets.
N Moustafa, M Ahmed, S Ahmed
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
492020
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
M Ahmed, S Byreddy, A Nutakki, LF Sikos, PS Dowland
Ad Hoc Networks 122, 2021
412021
Blockchain: Can It Be Trusted?
M Ahmed, ASK Pathan
Computer 53 (4), 31-35, 2020
392020
False Data Injection Attacks in Healthcare
M Ahmed, ASSM Barkat Ullah
Fifteenth Australasian Data Mining Conference, 2017
392017
The system can't perform the operation now. Try again later.
Articles 1–20