Follow
Ahmed Ibrahim
Ahmed Ibrahim
Sernior Lecturer of Computing and Security at School of Science, Researcher at ECU Security Research
Verified email at ecu.edu.au - Homepage
Title
Cited by
Cited by
Year
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
3362017
Denial of service attack detection through machine learning for the IoT
NF Syed, Z Baig, A Ibrahim, C Valli
Journal of Information and Telecommunication, 1-22, 2020
1362020
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
NF Syed, ZA Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings), 2017
113*2017
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing, 2018
722018
A cancelable iris-and steganography-based user authentication system for the Internet of Things
W Yang, S Wang, J Hu, A Ibrahim, G Zheng, MJ Macedo, MN Johnstone, ...
Sensors 19 (13), 2985, 2019
382019
Integration of Biometrics and Steganography: A Comprehensive Review
I McAteer, A Ibrahim, G Zheng, W Yang, C Valli
Technologies 7 (2), 34, 2019
342019
Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions
MI Malik, A Ibrahim, P Hannay, LF Sikos
Computers 12 (4), 79, 2023
262023
Steganalysis in computer forensics
A Ibrahim
Australian Digital Forensics Conference, 10, 2007
212007
Internet of Threats and Context Aware Security: Part Two
J Chaudhry, A Ibrahim, AK Bashir
http://sites.ieee.org/futuredirections/tech-policy-ethics/march-2017 …, 2017
62017
Analysis of attempted intrusions: intelligence gathered from SSH Honeypots
P Rabadia, C Valli, A Ibrahim, ZA Baig
Security Research Institute, Edith Cowan University, 2017
62017
Image similarity using dynamic time warping of fractal features
A Ibrahim, C Valli
13th Australian Digital Forensics Conference, 2015
52015
Bringing defensive artificial intelligence capabilities to mobile devices
K Chong, A Ibrahim
Australian Information Security Management Conference, 41-50, 2018
32018
Application of 3D Delaunay Triangulation in Fingerprint Authentication System
W Yang, G Zheng, A Ibrahim, J Chaudhry, S Wang, J Hu, C Valli
International Conference on Mobile Networks and Management, 291-298, 2017
32017
Dhivehi OCR: Character Recognition of Thaana Script using Machine Generated Text and Tesseract OCR Engine
A Ibrahim
International Journal of Social Research and Innovation 1 (1), 2016
32016
Cyber Security for network of things (nots) in Military Systems: Challenges and Countermeasures
MI Malik, IN McAteer, P Hannay, A Ibrahim, Z Baig, G Zheng
Security Analytics for the Internet of Everything, 231, 2020
22020
Internet of Threats and Context Aware Security: Part One
J Chaudhry, A Ibrahim, AK Bashir
http://sites.ieee.org/futuredirections/tech-policy-ethics/january-2017 …, 2017
22017
Building a dataset for image steganography
C Woolley, A Ibrahim, P Hannay
Security Research Institute, Edith Cowan University, 2017
12017
Suitability of lacunarity measure for blind steganalysis
A Ibrahim
12014
Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat
A Ibrahim, P Haskell-Dowland
The Conversation, 2021
2021
Bio-inspired Cyber-Security for the Smart Grid
N Syed, A Ibrahim, Z Baig, C Valli
Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20