Ahmed Ibrahim
Ahmed Ibrahim
Lecturer of Computing and Security at School of Science, Researcher at ECU Security Research
Verified email at ecu.edu.au - Homepage
Title
Cited by
Cited by
Year
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
1332017
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
NF Syed, ZA Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings), 2017
53*2017
Steganalysis in computer forensics
A Ibrahim
Australian Digital Forensics Conference, 10, 2007
182007
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing, 2018
152018
Integration of Biometrics and Steganography: A Comprehensive Review
I McAteer, A Ibrahim, G Zheng, W Yang, C Valli
Technologies 7 (2), 34, 2019
142019
Denial of service attack detection through machine learning for the IoT
NF Syed, Z Baig, A Ibrahim, C Valli
Journal of Information and Telecommunication, 1-22, 2020
112020
A cancelable iris-and steganography-based user authentication system for the Internet of Things
W Yang, S Wang, J Hu, A Ibrahim, G Zheng, MJ Macedo, MN Johnstone, ...
Sensors 19 (13), 2985, 2019
92019
Internet of Threats and Context Aware Security: Part Two
J Chaudhry, A Ibrahim, AK Bashir
http://sites.ieee.org/futuredirections/tech-policy-ethics/march-2017 …, 2017
8*2017
Internet of Threats and Context Aware Security: Part One
J Chaudhry, A Ibrahim, AK Bashir
http://sites.ieee.org/futuredirections/tech-policy-ethics/january-2017 …, 2017
32017
Image similarity using dynamic time warping of fractal features
A Ibrahim, C Valli
13th Australian Digital Forensics Conference, 2015
32015
Bringing defensive artificial intelligence capabilities to mobile devices
K Chong, A Ibrahim
Australian Information Security Management Conference, 41-50, 2018
22018
Analysis of attempted intrusions: intelligence gathered from SSH Honeypots
P Rabadia, C Valli, A Ibrahim, ZA Baig
Security Research Institute, Edith Cowan University, 2017
22017
Dhivehi OCR: Character Recognition of Thaana Script using Machine Generated Text and Tesseract OCR Engine
A Ibrahim
International Journal of Social Research and Innovation 1 (1), 2016
22016
Suitability of lacunarity measure for blind steganalysis
A Ibrahim
12014
Cyber Security for network of things (nots) in Military Systems: Challenges and Countermeasures
MI Malik, IN McAteer, P Hannay, A Ibrahim, Z Baig, G Zheng
Security Analytics for the Internet of Everything, 231, 2020
2020
Bio-inspired Cyber-Security for the Smart Grid
N Syed, A Ibrahim, Z Baig, C Valli
Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and …, 2019
2019
Application of 3D Delaunay Triangulation in Fingerprint Authentication System
W Yang, G Zheng, A Ibrahim, J Chaudhry, S Wang, J Hu, C Valli
International Conference on Mobile Networks and Management, 291-298, 2017
2017
Building a dataset for image steganography
C Woolley, A Ibrahim, P Hannay
Security Research Institute, Edith Cowan University, 2017
2017
Health care Data Security among ISO/IEEE 11073 DIM Compliant Personal Health Devices through Statistical Fingerprinting
J Chaudhry, U Qidwai, MH Miraz, A Ibrahim, C Valli
IEEE-GCC 2017, 2017
2017
Blind steganalysis using fractal features
A Ibrahim
2016
The system can't perform the operation now. Try again later.
Articles 1–20