Follow
Mohiuddin Ahmed
Mohiuddin Ahmed
Lecturer of Computing & Security at Edith Cowan University, IEEE Senior Member
Verified email at ecu.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of network anomaly detection techniques
M Ahmed, A Mahmood, J Hu
Journal of Network and Computer Applications 60, 19-31, 2016
9772016
A survey of anomaly detection techniques in financial domain
M Ahmed, A Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
3262016
A Novel Approach for Outlier Detection and Clustering Improvement
M Ahmed, A Mahmood
8th IEEE International Conference on Industrial Electronics and Applications …, 2013
732013
The k-means Algorithm: A Comprehensive Survey and Performance
M Ahmed, R Seraj, SMS Islam
Electronics 9 (8), 1-12, 2020
71*2020
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection
M Ahmed, A Mahmood
Annals of Data Science, 2015
642015
Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making
J Yang, MM Hassan, NY Lee, M Ahmed, CS Kim
Applied Sciences 9 (7), 2019
512019
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems
M Ahmed, A Anwar, A Mahmood, Z Shah, MJ Maher
Transactions on Industrial Networks and Intelligent Systems 15 (3), 1-16, 2015
49*2015
Network Traffic Analysis based on Collective Anomaly Detection
M Ahmed, A Mahmood
9th IEEE International Conference on Industrial Electronics and Applications …, 2014
452014
Data summarization: a survey
M Ahmed
Knowledge and Information Systems, 1-25, 2018
412018
False Data Injection Attacks in Internet of Things
B Bostami, M Ahmed, S Choudhury
Performability in Internet of Things, 47-58, 2018
332018
Network Traffic Pattern Analysis using Improved Information Theoretic Co-clustering based Collective Anomaly Detection
M Ahmed, A Mahmood
International Conference on Security and Privacy in Communication Networks …, 2015
322015
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure
M Ahmed, ASK Pathan
Complex Adaptive Systems Modeling 8 (4), 1-14, 2020
312020
False Data Injection Attacks in Healthcare
M Ahmed, ASSM Barkat Ullah
Fifteenth Australasian Data Mining Conference, 2017
292017
Anomaly Detection on Big Data in Financial Markets
M Ahmed, N Choudhury, S Uddin
2017 IEEE/ACM International Conference on Advances in Social Networks …, 2017
292017
Collective anomaly detection techniques for network traffic analysis
M Ahmed
Annals of data science 5 (4), 497-512, 2018
272018
Outlier Detection
M Ahmed, A Mahmood, J Hu
CRC Press, Taylor & Francis Group, USA, 2014
252014
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation
A Anwar, A Mahmood, M Ahmed
International Conference on Security and Privacy in Communication Networks …, 2015
212015
Blockchain: Can It Be Trusted?
M Ahmed, ASK Pathan
Computer 53 (4), 31-35, 2020
192020
Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering
M Ahmed
Computer 50 (9), 76-82, 2017
182017
False Image Injection Prevention Using iChain
M Ahmed
Applied Sciences 9 (20), 1-11, 2019
172019
The system can't perform the operation now. Try again later.
Articles 1–20