Multivariate online anomaly detection using kernel recursive least squares T Ahmed, M Coates, A Lakhina IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 206 | 2007 |
Machine learning approaches to network anomaly detection T Ahmed, B Oreshkin, M Coates Proceedings of the 2nd USENIX workshop on Tackling computer systems problems …, 2007 | 198 | 2007 |
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm SD Çakmakçı, T Kemmerich, T Ahmed, N Baykal Journal of Network and Computer Applications 168, 102756, 2020 | 65 | 2020 |
Online anomaly detection using KDE T Ahmed GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-8, 2009 | 61 | 2009 |
Real-time intruder detection in surveillance networks using adaptive kernel methods T Ahmed, S Ahmed, S Ahmed, M Motiwala 2010 IEEE International Conference on Communications, 1-5, 2010 | 27 | 2010 |
Detection of DDoS attacks and flash events using Shannon entropy, KOAD and Mahalanobis distance S Daneshgadeh, T Ahmed, T Kemmerich, N Baykal 2019 22nd Conference on Innovation in Clouds, Internet and Networks and …, 2019 | 26 | 2019 |
PeerMate: A malicious peer detection algorithm for P2P Systems based on MSPCA X Wei, T Ahmed, M Chen, ASK Pathan 2012 International Conference on Computing, Networking and Communications …, 2012 | 20 | 2012 |
SMART: A subspace based malicious peers detection algorithm for P2P systems X Wei, J Fan, M Chen, T Ahmed, ASK Pathan International Journal of Communication Networks and Information Security 5 …, 2013 | 18 | 2013 |
An empirical investigation of DDoS and Flash event detection using Shannon entropy, KOAD and SVM combined S Daneshgadeh, T Kemmerich, T Ahmed, N Baykal 2019 International Conference on Computing, Networking and Communications …, 2019 | 16 | 2019 |
Efficient and effective automated surveillance agents using kernel tricks T Ahmed, X Wei, S Ahmed, ASK Pathan Simulation 89 (5), 562-577, 2013 | 15 | 2013 |
Adaptive algorithms for automated intruder detection in surveillance networks T Ahmed, ASK Pathan, S Ahmed 2014 International Conference on Advances in Computing, Communications and …, 2014 | 13 | 2014 |
Intruder detection in camera networks using the one-class neighbor machine T Ahmed, X Wei, S Ahmed, ASK Pathan Proc. American Telecommunications Systems Management Association (ATSMA …, 2011 | 13 | 2011 |
Survey of anomaly detection algorithms: toward self-learning networks T AHMED, R RAHMAN Security of Self-Organizing Networks, 83-108, 2016 | 12 | 2016 |
Automated intruder detection from image sequences using minimum volume sets T Ahmed, X Wei, S Ahmed, ASK Pathan International journal of communication networks and information security 4 …, 2012 | 11 | 2012 |
A hybrid approach to detect DDoS attacks using KOAD and the Mahalanobis distance S Daneshgadeh, T Kemmerich, T Ahmed, N Baykal 2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018 | 8 | 2018 |
Sonar-based SLAM using occupancy grid mapping and dead reckoning MSA Khan, SS Chowdhury, N Niloy, FTZ Aurin, T Ahmed TENCON 2018-2018 IEEE Region 10 Conference, 1707-1712, 2018 | 8 | 2018 |
Supervising vehicle using pattern recognition: Detecting unusual behavior using machine learning algorithms M Lushan, M Bhattacharjee, T Ahmed, MA Rahman, S Ahmed 2018 IEEE Region Ten Symposium (Tensymp), 277-281, 2018 | 8 | 2018 |
Anomaly clustering based on correspondence analysis H Islam, T Ahmed 2018 IEEE 32nd International Conference on Advanced Information Networking …, 2018 | 8 | 2018 |
Multi image retrieval for kernel-based automated intruder detection A Anika, KLD Karim, R Muntaha, F Shahrear, S Ahmed, T Ahmed 2017 IEEE Region 10 Symposium (TENSYMP), 1-5, 2017 | 8 | 2017 |
Learning algorithms for anomaly detection from images T Ahmed, ASK Pathan, SS Ahmed Biometrics: Concepts, Methodologies, Tools, and Applications, 281-308, 2017 | 8 | 2017 |