default search action
Ahmed Ibrahim 0002
Person information
- affiliation: Edith Cowan University, Security Research Institute, Perth, Australia
Other persons with the same name
- Ahmed Ibrahim — disambiguation page
- Ahmed Ibrahim 0001 (aka: Ahmed M. Y. Ibrahim) — University of Twente, Testable Design and Test of Integrated Systems Group, Enschede,Netherlands
- Ahmed Ibrahim 0003 — Pennsylvania State University, University Park, PA, USA
- Ahmed Ibrahim 0004 — University of Virginia, Charlottesville, VA, USA (and 1 more)
- Ahmed Ibrahim 0005 — Memorial University, Faculty of Engineering and Applied Science, St. John's, Canada (and 1 more)
- Ahmed Ibrahim 0006 — Cairo University, Department of Computer and Information Science, Egypt
- Ahmed Ibrahim 0007 (aka: Ahmed M. Ibrahim) — University of California at Irvine, Electrical Engineering and Computer Science Department, CA, USA
- Ahmed Ibrahim 0008 — Tomsk Polytechnic University, Russia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ahmed Ibrahim, Marnie McKee, Leslie F. Sikos, Nicola F. Johnson:
A Systematic Review of K-12 Cybersecurity Education Around the World. IEEE Access 12: 59726-59738 (2024) - 2023
- [j6]Muhammad Imran Malik, Ahmed Ibrahim, Peter Hannay, Leslie F. Sikos:
Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions. Comput. 12(4): 79 (2023) - 2020
- [j5]Naeem Firdous Syed, Zubair A. Baig, Ahmed Ibrahim, Craig Valli:
Denial of service attack detection through machine learning for the IoT. J. Inf. Telecommun. 4(4): 482-503 (2020)
2010 – 2019
- 2019
- [j4]Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone, Craig Valli:
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors 19(13): 2985 (2019) - [j3]Ahmed Ibrahim, Craig Valli, Ian McAteer, Junaid Chaudhry:
Correction to: A security review of local government using NIST CSF: a case study. J. Supercomput. 75(9): 6158 (2019) - 2018
- [j2]Ahmed Ibrahim, Craig Valli, Ian McAteer, Junaid Ahsenali Chaudhry:
A security review of local government using NIST CSF: a case study. J. Supercomput. 74(10): 5171-5186 (2018) - 2017
- [j1]Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya Rabadia, Peter Hannay, Maxim Chernyshev, Mike Johnstone, Paresh Kerai, Ahmed Ibrahim, Krishnun Sansurooah, Syed Naeem Firdous, Matthew Peacock:
Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investig. 22: 3-13 (2017) - [c2]Syed Naeem Firdous, Zubair A. Baig, Craig Valli, Ahmed Ibrahim:
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. iThings/GreenCom/CPSCom/SmartData 2017: 748-755 - [c1]Wencheng Yang, Guanglou Zheng, Ahmed Ibrahim, Junaid Ahsenali Chaudhry, Song Wang, Jiankun Hu, Craig Valli:
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. MONAMI 2017: 291-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint