Follow
Ali Ahmed
Ali Ahmed
Program Director
Verified email at vuw.ac.nz - Homepage
Title
Cited by
Cited by
Year
Signature-based and machine-learning-based web application firewalls: A short survey
S Applebaum, T Gaber, A Ahmed
Procedia Computer Science 189, 359-367, 2021
492021
A context-risk-aware access control model for ubiquitous environments
A Ahmed, N Zhang
2008 International Multiconference on Computer Science and Information …, 2008
212008
Privdrm: A privacy-preserving secure digital right management system
T Gaber, A Ahmed, A Mostafa
Proceedings of the Evaluation and Assessment in Software Engineering, 481-486, 2020
152020
Interdisciplinary agile teaching
K Lundqvist, A Ahmed, D Fridman, JG Bernard
2019 IEEE Frontiers in Education Conference (FIE), 1-8, 2019
152019
Internet of Things: An end-to-end security layer
R Behrens, A Ahmed
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN …, 2017
152017
Towards the realisation of context-risk-aware access control in pervasive computing
A Ahmed, N Zhang
Telecommunication Systems 45, 127-137, 2010
142010
Teaching cyber-security for distance learners: A reflective study
A Ahmed, K Lundqvist, C Watterson, N Baghaei
2020 IEEE Frontiers in Education Conference (FIE), 1-7, 2020
92020
Literature-based discovery: Critical analysis and future directions
A Ahmed
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
62016
Contact tracing: ensuring privacy and security
D Storm van Leeuwen, A Ahmed, C Watterson, N Baghaei
Applied Sciences 11 (21), 9977, 2021
52021
On the Evaluation of the Security Usability of Bitcoin's APIs
P Tschannen, A Ahmed
Proceedings of the Evaluation and Assessment in Software Engineering, 405-412, 2020
52020
Trust-aware access control: How recent is your transaction history?
A Ahmed, A Alnajem
2012 Second International Conference on Digital Information and …, 2012
52012
Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility
C Farinella, A Ahmed, C Watterson
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
42021
An access control architecture for context-risk-aware access control: architectural design and performance Evaluation
A Ahmed, N Zhang
2010 Fourth International Conference on Emerging Security Information …, 2010
42010
A Security Architecture for the Internet of Things
R Behrens, A Ahmed
KSII Transactions on Internet and Information Systems (TIIS) 11 (12), 6092-6115, 2017
32017
The digital privacy laws and practices in the Jersey island
A Ahmed, D Booth
Procedia Computer Science 98, 163-168, 2016
32016
A metric for literature-based discovery methodology evaluation
A Ahmed, SM Alhashmi
2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015
32015
Software engineering for security as a non-functional requirement
N Ragab, A Ahmed, S AlHashmi
Intelligent Data Analysis and Applications: Proceedings of the Second Euro …, 2015
32015
A critical survey on current literature-based discovery models
A Ahmed, S Alhashmi
November 2014, accepted in the 24th IBIMA Conference Milan, 6-7, 2014
32014
Online student supervision: A reflective study on lessons and challenges
A Ahmed, C Watterson, K Lundqvist, J Ferreira
2021 IEEE Frontiers in Education Conference (FIE), 1-7, 2021
22021
Distance learning practices: A reflective study
A Ahmed, C Watterson, N Baghaei, K Lundqvist
Proceedings of the 28th International Conference on Computers in Education …, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20