QUT ePrints

Browse By Person: Ahmed, Ejaz

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 2005 | 2006 | 2008 | 2009 | 2010 | 2011 | 2014
Number of items: 16.

2005

Samad, Kashan, Ahmed, Ejaz, Mahmood, Waqar, Sharif, Kashif, & Chaudhry, Ahsan A. (2005) Efficient clustering approach for intrusion detection in adhoc networks. In Proceedings of Engineering Sciences and Technology, 2005. SCONEST 2005. Student Conference on, IEEE, NED University of Engineering and Technology, Karachi, pp. 1-6.
Number of full-text downloads 52

Sheikh, Riaz A., Sharif, Kashif, & Ahmed, Ejaz (2005) Performance analysis of unified enterprise application security framework. In Proceedings of Student Conference on Engineering Sciences and Technology 2005, IEEE, NED University of Engineering and Technology, Karachi.
Number of full-text downloads 90

Iqbal, Ahmed Ali, Mahmood, Waqar, & Ahmed, Ejaz (2005) TCP-DR an effective protocol for infrastructure based wireless networks. In Proceedings of the 2005 International Conference on Wireless Networks, ICWN '05, CSREA Press, Las Vegas, Navada.
Number of full-text downloads 52
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Iqbal, Ahmed Ali, Mahmood, Waqar, Ahmed, Ejaz, & Samad, Kashan (2005) Evaluation of distributed control signaling protocols in GMPLS. In Proceedings of Fourth International Conference on the Optical Internet, Chongqing.
Number of full-text downloads 100

Shafiq, Mohammed O., Ali, Arshad, Ahmed, Ejaz, Ahmed, Hafiz F., & Suguri, Hiroki (2005) Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In Parallel and Distributed Computing and Networks : Proceedings of the 23rd IASTED International Multi Conference on Applied Informatics, IASTED, Innsbruck, Austria.
Number of full-text downloads 73

2006

Ahmed, Ejaz, Samad, Kashan, & Mahmood, Waqar (2006) Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks. In 5th Conference, AusCERT2006 Gold Coast, Australia, May 2006 Proceedings, Gold Coast, Australia.
Number of full-text downloads 227

2008

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 413
Number of citations in Scopus 9
Number of citations in Web of Science® 3

2009

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 134
Number of citations in Scopus 2

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 279

2010

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 423

Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland. (In Press)
Number of full-text downloads 285
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Ahmed, Ejaz (2010) Monitoring and analysis of internet traffic targeting unused address spaces. PhD thesis, Queensland University of Technology.
Number of full-text downloads 914

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 1

2011

Kush, Nishchal, Foo, Ernest, Ahmed, Ejaz, Ahmed, Irfan, & Clark, Andrew (2011) Gap analysis of intrusion detection in smart grids. In Valli, Craig (Ed.) Proceedings of the 2nd International Cyber Resilience Conference, secau - Security Research Centre, Duxton Hotel, Perth, WA, pp. 38-46.
Number of full-text downloads 438

Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Number of full-text downloads 162
Number of citations in Scopus 3

2014

Kush, Nishchal, Branagan, Mark, Foo, Ernest, & Ahmed, Ejaz (2014) Poisoned GOOSE : exploiting the GOOSE protocol. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 17-22.
Number of full-text downloads 74

This list was generated on Sat Jul 19 05:55:37 2014 EST.