QUT ePrints

Browse By Person: Ahmed, Ejaz

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 2005 | 2006 | 2008 | 2009 | 2010 | 2011 | 2012 | 2014
Number of items: 17.


Samad, Kashan, Ahmed, Ejaz, Mahmood, Waqar, Sharif, Kashif, & Chaudhry, Ahsan A. (2005) Efficient clustering approach for intrusion detection in adhoc networks. In Proceedings of Engineering Sciences and Technology, 2005. SCONEST 2005. Student Conference on, IEEE, NED University of Engineering and Technology, Karachi, pp. 1-6.
Number of full-text downloads 58

Sheikh, Riaz A., Sharif, Kashif, & Ahmed, Ejaz (2005) Performance analysis of unified enterprise application security framework. In Proceedings of Student Conference on Engineering Sciences and Technology 2005, IEEE, NED University of Engineering and Technology, Karachi.
Number of full-text downloads 109

Iqbal, Ahmed Ali, Mahmood, Waqar, & Ahmed, Ejaz (2005) TCP-DR an effective protocol for infrastructure based wireless networks. In Proceedings of the 2005 International Conference on Wireless Networks, ICWN '05, CSREA Press, Las Vegas, Navada.
Number of full-text downloads 60
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Iqbal, Ahmed Ali, Mahmood, Waqar, Ahmed, Ejaz, & Samad, Kashan (2005) Evaluation of distributed control signaling protocols in GMPLS. In Proceedings of Fourth International Conference on the Optical Internet, Chongqing.
Number of full-text downloads 113

Shafiq, Mohammed O., Ali, Arshad, Ahmed, Ejaz, Ahmed, Hafiz F., & Suguri, Hiroki (2005) Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In Parallel and Distributed Computing and Networks : Proceedings of the 23rd IASTED International Multi Conference on Applied Informatics, IASTED, Innsbruck, Austria.
Number of full-text downloads 76


Ahmed, Ejaz, Samad, Kashan, & Mahmood, Waqar (2006) Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks. In 5th Conference, AusCERT2006 Gold Coast, Australia, May 2006 Proceedings, Gold Coast, Australia.
Number of full-text downloads 257


Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 436
Number of citations in Scopus 9
Number of citations in Web of Science® 3


Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 136
Number of citations in Scopus 2

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 296


Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 445

Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland. (In Press)
Number of full-text downloads 311
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Ahmed, Ejaz (2010) Monitoring and analysis of internet traffic targeting unused address spaces. PhD thesis, Queensland University of Technology.
Number of full-text downloads 989

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 1


Kush, Nishchal, Foo, Ernest, Ahmed, Ejaz, Ahmed, Irfan, & Clark, Andrew (2011) Gap analysis of intrusion detection in smart grids. In Valli, Craig (Ed.) Proceedings of the 2nd International Cyber Resilience Conference, secau - Security Research Centre, Duxton Hotel, Perth, WA, pp. 38-46.
Number of full-text downloads 476

Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Number of full-text downloads 194
Number of citations in Scopus 4


Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Ahmed, Ejaz (2012) Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Security and Communication Networks, 5(2), pp. 125-144.
Number of citations in Scopus 3
Number of citations in Web of Science® 3


Kush, Nishchal, Branagan, Mark, Foo, Ernest, & Ahmed, Ejaz (2014) Poisoned GOOSE : exploiting the GOOSE protocol. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 17-22.
Number of full-text downloads 95

This list was generated on Sat Dec 20 05:12:21 2014 AEST.