Ahmed Aleroud
Title
Cited by
Cited by
Year
Phishing environments, techniques, and countermeasures: A survey
A Aleroud, L Zhou
Computers & Security 68, 160-196, 2017
1122017
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach
A AlEroud, I Alsmadi
Journal of Network and Computer Applications 80, 152-164, 2017
542017
A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks
A AlEroud, G Karabatis
ASE/IEEE International Conference on Cyber Security (CyberSec'12), 40-45, 2012
392012
An efficient activity recognition framework: Toward privacy-sensitive health data sensing
S Samarah, MG Al Zamil, AF Aleroud, M Rawashdeh, MF Alhamid, ...
IEEE Access 5, 3848-3859, 2017
312017
Contextual information fusion for intrusion detection: a survey and taxonomy
A Aleroud, G Karabatis
Knowledge and Information Systems 52 (3), 563-619, 2017
292017
Toward zero-day attack identification using linear data transformation techniques
A Aleroud, G Karabatis
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
282013
Evaluating Google queries based on language preferences
AF Al-Eroud, MA Al-Ramahi, MN Al-Kabi, IM Alsmadi, EM Al-Shawakfa
Journal of Information Science 37 (3), 282-292, 2011
272011
Context infusion in semantic link networks to detect cyber-attacks: A flow-based detection approach
A Aleroud, G Karabatis
2014 IEEE International Conference on Semantic Computing, 175-182, 2014
212014
Context and semantics for detection of cyber attacks
A Aleroud, G Karabatis, P Sharma, P He
International Journal of Information and Computer Security 7 6 (1), 63-92, 2014
182014
A system for cyber attack detection using contextual semantics
A AlEroud, G Karabatis
7th international conference on knowledge management in organizations …, 2013
172013
Identifying DoS attacks on software defined networks: a relation context approach
A Aleroud, I Alsmadi
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 853-857, 2016
162016
Multi-granular aggregation of network flows for security analysis
T Ding, A AlEroud, G Karabatis
2015 IEEE international conference on intelligence and security informatics …, 2015
142015
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach
AF AlEroud, G Karabatis
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 1 - 17, 2016
132016
Flow-based system and method for detecting cyber-attacks utilizing contextual information
G Karabatis, A Aleroud
US Patent App. 14/573,796, 2015
132015
Information fusion for cyber-security analytics
IM Alsmadi, G Karabatis, A Aleroud
Springer International Publishing, 2017
102017
Combating Arabic web spam using content analysis
M Al-Kabi, H Wahsheh, A AlEroud, I Alsmadi
Proceedings of the 2011 IEEE Jordan Conference on Applied Electrical …, 2011
92011
Detecting zero-day attacks using contextual relations
A Aleroud, G Karabatis
International Conference on Knowledge Management in Organizations, 373-385, 2014
82014
Discovering Unknown Cyber Attacks using Contextual Misuse and Anomaly Detection
GK Ahmed AlEroud
ASE Science Journal 1 (1), 106-120, 2012
82012
Examining web search trends across Arab countries
M Al-Kabi, A Wahbeh, A Alsobeh, A Ale’roud, I Alsmadi
Arabian Journal for Science and Engineering 37 (6), 1585-1593, 2012
72012
Practical information security
I Alsmadi, R Burdwell, A Aleroud, A Wahbeh, MA Al-Qudah, A Al-Omari
Cham: Springer 78 (3), 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20