A survey of network anomaly detection techniques M Ahmed, A Mahmood, J Hu Journal of Network and Computer Applications 60, 19-31, 2016 | 1622 | 2016 |
The k-means Algorithm: A Comprehensive Survey and Performance M Ahmed, R Seraj, SMS Islam Electronics 9 (8), 1-12, 2020 | 875* | 2020 |
A survey of anomaly detection techniques in financial domain M Ahmed, A Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 578 | 2016 |
Explainable artificial intelligence approaches: A survey SR Islam, W Eberle, SK Ghafoor, M Ahmed arXiv preprint arXiv:2101.09429, 2021 | 131 | 2021 |
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure M Ahmed, ASK Pathan Complex Adaptive Systems Modeling 8 (4), 1-14, 2020 | 122 | 2020 |
A Novel Approach for Outlier Detection and Clustering Improvement M Ahmed, A Mahmood 8th IEEE International Conference on Industrial Electronics and Applications …, 2013 | 98 | 2013 |
Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making J Yang, MM Hassan, NY Lee, M Ahmed, CS Kim Applied Sciences 9 (7), 2019 | 93 | 2019 |
Data summarization: a survey M Ahmed Knowledge and Information Systems, 1-25, 2018 | 93 | 2018 |
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection M Ahmed, A Mahmood Annals of Data Science, 2015 | 86 | 2015 |
Biometrics for Internet-of-Things Security: A Review W Yang, S Wang, NM Sahri, N Karie, M Ahmed, C Valli Sensors 21 (18), 1-26, 2021 | 78 | 2021 |
Anomaly Detection on Big Data in Financial Markets M Ahmed, N Choudhury, S Uddin 2017 IEEE/ACM International Conference on Advances in Social Networks …, 2017 | 68 | 2017 |
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems M Ahmed, A Anwar, A Mahmood, Z Shah, MJ Maher Transactions on Industrial Networks and Intelligent Systems 15 (3), 1-16, 2015 | 66* | 2015 |
Toward a Sustainable Cybersecurity Ecosystem S Sadik, M Ahmed, LF Sikos, AKMN Islam Computers 9 (3), 1-17, 2020 | 61 | 2020 |
Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets. N Moustafa, M Ahmed, S Ahmed 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 55 | 2020 |
Network Traffic Analysis based on Collective Anomaly Detection M Ahmed, A Mahmood 9th IEEE International Conference on Industrial Electronics and Applications …, 2014 | 53 | 2014 |
A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET AFMS Akhter, M Ahmed, AFMS Shah, A Anwar, A Zengin Sustainability 13 (1), 1-25, 2021 | 51 | 2021 |
False Data Injection Attacks in Internet of Things B Bostami, M Ahmed, S Choudhury Performability in Internet of Things, 47-58, 2018 | 49 | 2018 |
Collective anomaly detection techniques for network traffic analysis M Ahmed Annals of data science 5 (4), 497-512, 2018 | 42 | 2018 |
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things M Ahmed, S Byreddy, A Nutakki, LF Sikos, PS Dowland Ad Hoc Networks 122, 2021 | 41 | 2021 |
Blockchain: Can It Be Trusted? M Ahmed, ASK Pathan Computer 53 (4), 31-35, 2020 | 40 | 2020 |