Signature-based and machine-learning-based web application firewalls: A short survey S Applebaum, T Gaber, A Ahmed Procedia Computer Science 189, 359-367, 2021 | 49 | 2021 |
A context-risk-aware access control model for ubiquitous environments A Ahmed, N Zhang 2008 International Multiconference on Computer Science and Information …, 2008 | 21 | 2008 |
Privdrm: A privacy-preserving secure digital right management system T Gaber, A Ahmed, A Mostafa Proceedings of the Evaluation and Assessment in Software Engineering, 481-486, 2020 | 15 | 2020 |
Interdisciplinary agile teaching K Lundqvist, A Ahmed, D Fridman, JG Bernard 2019 IEEE Frontiers in Education Conference (FIE), 1-8, 2019 | 15 | 2019 |
Internet of Things: An end-to-end security layer R Behrens, A Ahmed 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN …, 2017 | 15 | 2017 |
Towards the realisation of context-risk-aware access control in pervasive computing A Ahmed, N Zhang Telecommunication Systems 45, 127-137, 2010 | 14 | 2010 |
Teaching cyber-security for distance learners: A reflective study A Ahmed, K Lundqvist, C Watterson, N Baghaei 2020 IEEE Frontiers in Education Conference (FIE), 1-7, 2020 | 9 | 2020 |
Literature-based discovery: Critical analysis and future directions A Ahmed International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | 6 | 2016 |
Contact tracing: ensuring privacy and security D Storm van Leeuwen, A Ahmed, C Watterson, N Baghaei Applied Sciences 11 (21), 9977, 2021 | 5 | 2021 |
On the Evaluation of the Security Usability of Bitcoin's APIs P Tschannen, A Ahmed Proceedings of the Evaluation and Assessment in Software Engineering, 405-412, 2020 | 5 | 2020 |
Trust-aware access control: How recent is your transaction history? A Ahmed, A Alnajem 2012 Second International Conference on Digital Information and …, 2012 | 5 | 2012 |
Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility C Farinella, A Ahmed, C Watterson 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 4 | 2021 |
An access control architecture for context-risk-aware access control: architectural design and performance Evaluation A Ahmed, N Zhang 2010 Fourth International Conference on Emerging Security Information …, 2010 | 4 | 2010 |
A Security Architecture for the Internet of Things R Behrens, A Ahmed KSII Transactions on Internet and Information Systems (TIIS) 11 (12), 6092-6115, 2017 | 3 | 2017 |
The digital privacy laws and practices in the Jersey island A Ahmed, D Booth Procedia Computer Science 98, 163-168, 2016 | 3 | 2016 |
A metric for literature-based discovery methodology evaluation A Ahmed, SM Alhashmi 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 3 | 2015 |
Software engineering for security as a non-functional requirement N Ragab, A Ahmed, S AlHashmi Intelligent Data Analysis and Applications: Proceedings of the Second Euro …, 2015 | 3 | 2015 |
A critical survey on current literature-based discovery models A Ahmed, S Alhashmi November 2014, accepted in the 24th IBIMA Conference Milan, 6-7, 2014 | 3 | 2014 |
Online student supervision: A reflective study on lessons and challenges A Ahmed, C Watterson, K Lundqvist, J Ferreira 2021 IEEE Frontiers in Education Conference (FIE), 1-7, 2021 | 2 | 2021 |
Distance learning practices: A reflective study A Ahmed, C Watterson, N Baghaei, K Lundqvist Proceedings of the 28th International Conference on Computers in Education …, 2020 | 2 | 2020 |