Adaptive encrypted traffic fingerprinting with bi-directional dependence K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ... Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 98 | 2016 |
Recurring and novel class detection using class-based ensemble for evolving data stream T Al-Khateeb, MM Masud, KM Al-Naami, SE Seker, AM Mustafa, L Khan, ... IEEE Transactions on Knowledge and Data Engineering 28 (10), 2752-2764, 2015 | 50 | 2015 |
GISQF: An efficient spatial query processing system KM Al Naami, S Seker, L Khan 2014 IEEE 7th international conference on cloud computing, 681-688, 2014 | 37 | 2014 |
Ensemble classification over stock market time series and economy news SE Seker, C Mert, K Al-Naami, U Ayan, N Ozalp 2013 IEEE International Conference on Intelligence and Security Informatics …, 2013 | 35 | 2013 |
Bimorphing: A bi-directional bursting defense against website fingerprinting attacks K Al-Naami, A El-Ghamry, MS Islam, L Khan, B Thuraisingham, ... IEEE Transactions on Dependable and Secure Computing 18 (2), 505-517, 2019 | 32 | 2019 |
Time series analysis on stock market for text mining correlation of economy news SE Seker, C Mert, K Al-Naami, N Ozalp, U Ayan International Journal of Social Sciences and Humanity Studies 6 (1), 69-91, 2013 | 29 | 2013 |
Sentimental analysis on Turkish blogs via ensemble classifier SE Seker, K Al-Naami Proc. the 2013 International Conference on Data Mining, 10-16, 2013 | 29 | 2013 |
Unsupervised deep embedding for novel class detection over data stream AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ... 2017 IEEE International Conference on Big Data (Big Data), 1830-1839, 2017 | 23 | 2017 |
Author attribution on streaming data SE Seker, K Al-Naami, L Khan 2013 IEEE 14th International Conference on Information Reuse & Integration …, 2013 | 20 | 2013 |
Automating Cyberdeception Evaluation with Deep Learning. G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan HICSS 3, 1-10, 2020 | 16 | 2020 |
Improving intrusion detectors by crook-sourcing F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 13 | 2019 |
P2V: Effective website fingerprinting using vector space representations K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham 2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015 | 13 | 2015 |
GISQAF: MapReduce guided spatial query processing and analytics system KM Al‐Naami, SE Seker, L Khan Software: Practice and Experience 46 (10), 1329-1349, 2016 | 7 | 2016 |
Correlation between the economy news and stock market in Turkey SE Seker, C Mert, K Al-Naami, N Ozalp, U Ayan International Journal of Business Intelligence Research (IJBIR) 4 (4), 1-21, 2013 | 7 | 2013 |
Crook-sourced intrusion detection as a service F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan Journal of Information Security and Applications 61, 102880, 2021 | 3 | 2021 |
Correlation between Turkish stock market and economy news Ş ŞEKER, N Özalp, K Al-Naami, C Mert, Z Erdem | 2 | 2013 |
Enhancing Cybersecurity with Encrypted Traffic Fingerprinting KM Al Naami | | 2017 |
2016 Index IEEE Transactions on Knowledge and Data Engineering Vol. 28 PJ Abad, L Abdi, A Abello, A Adiga, PK Agarwal, C Aggarwal, M Aggarwal, ... IEEE Transactions on Knowledge and Data Engineering 29 (1), 2017 | | 2017 |
Time Series Analysis on Stock Market for Text Mining Correlation of Economy News S Evren Seker, C Mert, K Al-Naami, N Ozalp, U Ayan arXiv e-prints, arXiv: 1403.2002, 2014 | | 2014 |
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18 S Adepu, A Agarwal, G Ahn, S Akter, MA Al Faruque, M Al-Asli, ... | | |