Follow
Ameer Al-Nemrat
Ameer Al-Nemrat
Senior Lecturer in Computer Science, University of East London
Verified email at uel.ac.uk
Title
Cited by
Cited by
Year
Deep learning approach for intelligent intrusion detection system
R Vinayakumar, M Alazab, KP Soman, P Poornachandran, A Al-Nemrat, ...
Ieee Access 7, 41525-41550, 2019
15912019
Cybercrime classification and characteristics
H Jahankhani, A Al-Nemrat, A Hosseinian-Far
Cyber crime and cyber terrorism investigator's handbook, 149-164, 2014
1242014
Variance ranking attributes selection techniques for binary classification problem in imbalance data
SH Ebenuwa, MS Sharif, M Alazab, A Al-Nemrat
IEEE access 7, 24649-24666, 2019
1232019
Fast authentication in wireless sensor networks
C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab
Future Generation Computer Systems 55, 362-375, 2016
912016
Cyber crime and cyber terrorism investigator's handbook
B Akhgar, A Staniforth, F Bosco
Syngress, 2014
842014
A dynamic access control model using authorising workflow and task-role-based access control
M Uddin, S Islam, A Al-Nemrat
Ieee Access 7, 166676-166689, 2019
822019
Analysing Human Factors for an Effective Information Security Management System
R Alavi, S Islam, H Jahankhani, A Al-Nemrat
International Journal of Security Software Engineering (IJSSE), Special …, 2012
332012
An Analysis of Honeypot Programs and the Attack Data Collected
C Moore, A Al-Nemrat
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015
302015
Forensic malware analysis: The value of fuzzy hashing algorithms in identifying similarities
N Sarantinos, C Benzaďd, O Arabiat, A Al-Nemrat
2016 IEEE Trustcom/BigDataSE/ISPA, 1782-1787, 2016
272016
Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
F Amuchie, A Al-Nemrat, M Alazab, R Layton
IEEE 3rd Cybercrime & Trustworthy Computing Workshop, CTC 2012, Sydney …, 2012
252012
Sustainability in information systems auditing
AABLA Rahman, A Al-Nemrat, DS Preston
European Scientific Journal, 2014
222014
Examination of cyber-criminal behaviour
H Jahankhani, A Al-Nemrat
International Journal of Information Science and Management (IJISM), 41-48, 2012
222012
Intelligent detection of MAC spoofing attack in 802.11 network
C Benzaďd, A Boulgheraif, FZ Dahmane, A Al-Nemrat, K Zeraoulia
Proceedings of the 17th International Conference on Distributed Computing …, 2016
192016
ARP Cache Poisoning Mitigation and Forensics Investigation
AH Mangut, A Al-Nemrat, A Benzaid, Chafika, Tawil
The 14th IEEE International Conference on Trust, Security and Privacy in …, 2015
192015
Cybercrime profiling and trend analysis
H Jahankhani, A Al-Nemrat
Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism …, 2011
172011
Cybercrime Victimisations/Criminalisation and Punishment
A Al-Nemrat, H Jahankhani, DS Preston
Global Security, Safety, and Sustainability 92 (1), 55-62, 2010
172010
Analysis of malware behaviour: Using data mining clustering techniques to support forensics investigation
EI Edem, C Benzaďd, A Al-Nemrat, P Watters
2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014
162014
Securing Address Registration in Location/ID Split Protocol using ID-Based Cryptography
M Aiash, A Al-Nemrat, D Preston
The 11th International Conference on Wired/Wireless Internet Communications …, 2013
15*2013
Sufficiency of windows event log as evidence in digital forensics
NM Ibrahim, A Al-Nemrat, H Jahankhani, R Bashroush
International Conference on e-Democracy, 253-262, 2011
142011
Improved awareness on fake websites and detecting techniques
H Jahankhani, T Jayaraveendran, W Kapuku-Bwabw
International Conference on e-Democracy, 271-279, 2011
132011
The system can't perform the operation now. Try again later.
Articles 1–20