default search action
Ibrahim Ghafir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Bhasker Bapuram, Murali Subramanian, Anand Mahendran, Ibrahim Ghafir, Vijayan Ellappan, Mohammed Hamada:
Extended water wave optimization (EWWO) technique: a proposed approach for task scheduling in IoMT and healthcare applications. Evol. Intell. 17(5): 3609-3620 (2024) - [j9]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan, Khalil M. El Hindi, Anand Mahendran:
Latent Semantic Analysis and Graph Theory for Alert Correlation: A Proposed Approach for IoT Botnet Detection. IEEE Open J. Commun. Soc. 5: 3904-3919 (2024) - [c21]Alhassan Abdulhamid, Sohag Kabir, Ibrahim Ghafir, Ci Lei:
Navigating IoT Security Assessment: Current Methods, Challenges and Future Directions. ACIT 2024: 471-475 - [c20]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Latent Semantic Analysis for Feature Selection: A Proposed Approach for Anomaly Detection in Network Traffic. ACIT 2024: 517-522 - [c19]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Non-Negative Matrix Factorisation for Feature Selection: A Proposed Approach for the Detection of Multi-Stage Attacks. ACIT 2024: 523-528 - [c18]Zahra J. Muhsin, Rami Qahwaji, Ibrahim Ghafir, Muawyah Al Bdour, Saif AlRyalat, Mo'ath AlShawabkeh, Majid A. Al-Taee:
Performance Comparison of Machine Learning Algorithms for Keratoconus Detection. ICT 2024: 1-6 - 2023
- [j8]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks. IEEE Trans. Ind. Informatics 19(1): 921-929 (2023) - [c17]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Latent Dirichlet Allocation for the Detection of Multi-Stage Attacks. ACIT 2023: 1-7 - [c16]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Sequential Pattern Mining: A Proposed Approach for Intrusion Detection Systems. ICFNDS 2023: 599-604 - [c15]Ayorinde Henry Omopintemi, Ibrahim Ghafir, Shadi Eltanani, Sohag Kabir, Moemedi Lefoane:
Machine Learning for Malware Detection in Network Traffic. ICFNDS 2023: 605-610 - 2022
- [c14]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Multi-stage Attack Detection: Emerging Challenges for Wireless Networks. SmartNets 2022: 1-5 - 2021
- [j7]Diab M. Diab, Basil AsSadhan, Hamad Binsalleeh, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir:
Denial of service detection using dynamic time warping. Int. J. Netw. Manag. 31(6) (2021) - [c13]Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Machine Learning for Botnet Detection: An Optimized Feature Selection Approach. ICFNDS 2021: 195-200 - [c12]Shadi Eltanani, Ibrahim Ghafir:
Aerial Wireless Networks: Proposed Solution for Coverage Optimisation. INFOCOM Workshops 2021: 1-6 - 2020
- [c11]Shadi Eltanani, Ibrahim Ghafir:
Coverage Optimisation for Aerial Wireless Networks. IIT 2020: 233-238
2010 – 2019
- 2019
- [j6]Ibrahim Ghafir, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan, Francisco J. Aparicio-Navarro, Basil AsSadhan, Hamad Binsalleeh, Diab M. Diab:
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats. IEEE Access 7: 99508-99520 (2019) - [j5]Noshina Tariq, Muhammad Asim, Feras N. Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir:
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors 19(8): 1788 (2019) - [c10]Diab M. Diab, Basil AsSadhan, Hamad Binsalleeh, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir:
Anomaly Detection Using Dynamic Time Warping. CSE/EUC 2019: 193-198 - [c9]Mohammad Hammoudeh, Ibrahim Ghafir, Ahcène Bounceur, Thomas Rawlinson:
Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain. ICFNDS 2019: 27:1-27:5 - [c8]Francisco J. Aparicio-Navarro, Timothy A. Chadza, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir, Sangarapillai Lambotharan, Basil AsSadhan:
Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information. ICIN 2019: 188-194 - [c7]Yuan Zhang, Qinghai Yang, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir, Basil AsSadhan:
Anomaly-Based Network Intrusion Detection Using SVM. WCSP 2019: 1-6 - 2018
- [j4]Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Thar Baker, Sohail Jabbar, Shehzad Khalid, Sardar F. Jaf:
BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access 6: 38947-38958 (2018) - [j3]Ibrahim Ghafir, Konstantinos G. Kyriakopoulos, Francisco J. Aparicio-Navarro, Sangarapillai Lambotharan, Basil AsSadhan, Hamad Binsalleeh:
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection. IEEE Access 6: 40008-40023 (2018) - [j2]Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil, Liangxiu Han, Robert Hegarty, Khaled M. Rabie, Francisco J. Aparicio-Navarro:
Detection of advanced persistent threat using machine-learning correlation analysis. Future Gener. Comput. Syst. 89: 349-359 (2018) - [j1]Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh, Hanan Faour, Vaclav Prenosil, Sardar F. Jaf, Sohail Jabbar, Thar Baker:
Security threats to critical infrastructure: the human factor. J. Supercomput. 74(10): 4986-5002 (2018) - [c6]Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Francisco J. Aparicio-Navarro, Khaled M. Rabie, Ahmad Jabban:
Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat. ICFNDS 2018: 44:1-44:5 - [c5]Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir, Sangarapillai Lambotharan, Jonathon A. Chambers:
Multi-Stage Attack Detection Using Contextual Information. MILCOM 2018: 1-9 - [i2]Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil:
Defending against the advanced persistent threat: Detection of disguised executable files. PeerJ Prepr. 6: e2998 (2018) - 2017
- [b1]Ibrahim Ghafir:
A machine-learning-based system for real-time advanced persistent threat detection and prediction. Manchester Metropolitan University, UK, 2017 - [c4]Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, Umar Raza:
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence. ICFNDS 2017: 27 - [c3]Umar Raza, James Lomax, Ibrahim Ghafir, Rupak Kharel, Ben Whiteside:
An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processes. ICFNDS 2017: 37:1-37:8 - [i1]Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil:
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat. PeerJ Prepr. 5: e2998 (2017) - 2016
- [c2]Ibrahim Ghafir, Vaclav Prenosil, Jakub Svoboda, Mohammad Hammoudeh:
A Survey on Network Security Monitoring Systems. FiCloud Workshops 2016: 77-82 - [c1]Ibrahim Ghafir, Vaclav Prenosil, Ahmad Alhejailan, Mohammad Hammoudeh:
Social Engineering Attack Strategies and Defence Approaches. FiCloud 2016: 145-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint