Browse By Person: Ahmed, Ejaz
|Up a level|
Group by: Item Type | Date
Number of items: 20.
Tickle, Alan, Ahmed, Ejaz, Bhaskar, Surinder, Mohay, George, Panichprecha, Sorot, Raghavan, S., et al. (2011) Background. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 9-40.
Mohay, George, Ahmed, Ejaz, Bhatia, Sajal, Nadarajan, Anitha, Ravindran, B., Tickle, Alan, et al. (2011) Detection and mitigation of high-rate flooding attacks. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 131-181.
Smith, Jason, Ahmed, Ejaz, Chellappan, C., Meenakshi, S., Raghavan, S., Suriadi, Suriadi, et al. (2011) DoS vulnerabilities in IPv6. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 299-321.
Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Ahmed, Ejaz (2012) Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Security and Communication Networks, 5(2), pp. 125-144.
Kush, Nishchal, Branagan, Mark, Foo, Ernest, & Ahmed, Ejaz (2014) Poisoned GOOSE : exploiting the GOOSE protocol. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 17-22.
Kush, Nishchal, Foo, Ernest, Ahmed, Ejaz, Ahmed, Irfan, & Clark, Andrew (2011) Gap analysis of intrusion detection in smart grids. In Valli, Craig (Ed.) Proceedings of the 2nd International Cyber Resilience Conference, secau - Security Research Centre, Duxton Hotel, Perth, WA, pp. 38-46.
Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland. (In Press)
Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited trafﬁc. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Ahmed, Ejaz, Samad, Kashan, & Mahmood, Waqar (2006) Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks. In 5th Conference, AusCERT2006 Gold Coast, Australia, May 2006 Proceedings, Gold Coast, Australia.
Samad, Kashan, Ahmed, Ejaz, Mahmood, Waqar, Sharif, Kashif, & Chaudhry, Ahsan A. (2005) Efficient clustering approach for intrusion detection in adhoc networks. In Proceedings of Engineering Sciences and Technology, 2005. SCONEST 2005. Student Conference on, IEEE, NED University of Engineering and Technology, Karachi, pp. 1-6.
Sheikh, Riaz A., Sharif, Kashif, & Ahmed, Ejaz (2005) Performance analysis of unified enterprise application security framework. In Proceedings of Student Conference on Engineering Sciences and Technology 2005, IEEE, NED University of Engineering and Technology, Karachi.
Iqbal, Ahmed Ali, Mahmood, Waqar, & Ahmed, Ejaz (2005) TCP-DR an effective protocol for infrastructure based wireless networks. In Proceedings of the 2005 International Conference on Wireless Networks, ICWN '05, CSREA Press, Las Vegas, Navada.
Iqbal, Ahmed Ali, Mahmood, Waqar, Ahmed, Ejaz, & Samad, Kashan (2005) Evaluation of distributed control signaling protocols in GMPLS. In Proceedings of Fourth International Conference on the Optical Internet, Chongqing.
Shafiq, Mohammed O., Ali, Arshad, Ahmed, Ejaz, Ahmed, Hafiz F., & Suguri, Hiroki (2005) Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In Parallel and Distributed Computing and Networks : Proceedings of the 23rd IASTED International Multi Conference on Applied Informatics, IASTED, Innsbruck, Austria.
Ahmed, Ejaz (2010) Monitoring and analysis of internet traffic targeting unused address spaces. PhD thesis, Queensland University of Technology.