Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection MA Rahman, AT Asyhari, OW Wen, H Ajra, Y Ahmed, F Anwar Multimedia Tools and Applications 80 (20), 31381-31399, 2021 | 40 | 2021 |
Cybersecurity metrics for enhanced protection of healthcare IT systems Y Ahmed, S Naqvi, M Josephs 2019 13th International Symposium on Medical Information and Communication …, 2019 | 34 | 2019 |
A cyber kill chain approach for detecting advanced persistent threats Y Ahmed, AT Asyhari, MA Rahman Computers, Materials and Continua 67 (2), 2497-2513, 2021 | 30 | 2021 |
Aggregation of security metrics for decision making: a reference architecture Y Ahmed, S Naqvi, M Josephs Proceedings of the 12th European Conference on Software Architecture …, 2018 | 13 | 2018 |
Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies MB Farah, MO Al-Kadri, Y Ahmed, R Abouzariba, X Bellekens 2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023 | 2 | 2023 |
A survey on blockchain technology in the maritime industry: Challenges and future perspectives MB Farah, Y Ahmed, H Mahmoud, SA Shah, MO Al-kadri, S Taramonli, ... Future Generation Computer Systems, 2024 | 1 | 2024 |
Enhancing Security Awareness Through Gamified Approaches Y Ahmed, M Ezealor, H Mahmoud, MA Azad, M BenFarah, M Yousefi arXiv preprint arXiv:2404.09052, 2024 | | 2024 |
Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features Y Ahmed, MA Azad, T Asyhari Information 15 (1), 36, 2024 | | 2024 |
A Smart-Contract-Based Adaptive Security Governance Architecture for Smart City Service Interoperations S Siddiqui, S Hameed, SA Shah, J Arshad, Y Ahmed, D Draheim Available at SSRN 4682364, 0 | | |