关注
Faeiz M Alserhani
Faeiz M Alserhani
Jouf University
在 ju.edu.sa 的电子邮件经过验证
标题
引用次数
引用次数
年份
MARS: multi-stage attack recognition system
F Alserhani, M Akhlaq, IU Awan, AJ Cullen, P Mirchandani
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
712010
Evaluating intrusion detection systems in high speed networks
F Alserhani, M Akhlaq, IU Awan, J Mellor, AJ Cullen, P Mirchandani
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
282009
Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack
FM Alserhani
International Journal of Advanced Studies in Computers, Science and …, 2016
212016
Snort performance evaluation
F Alserhani, M Akhlaq, IU Awan, AJ Cullen, J Mellor, P Mirchandani
Proceedings of Twenty Fifth UK Performance Engineering Workshop (UKPEW 2009 …, 2009
172009
Implementation and evaluation of network intrusion detection systems
M Akhlaq, F Alserhani, I Awan, J Mellor, AJ Cullen, A Al-Dhelaan
Network Performance Engineering: A Handbook on Convergent Multi-Service …, 2011
162011
Event-based alert correlation system to detect SQLI activities
F Alserhani, M Akhlaq, IU Awan, AJ Cullen
2011 IEEE International Conference on Advanced Information Networking and …, 2011
152011
Detection of coordinated attacks using alert correlation model
F Alserhani, M Akhlaq, IU Awan, AJ Cullen
2010 IEEE International Conference on Progress in Informatics and Computing …, 2010
142010
Empowered certification authority in vanets
M Akhlaq, B Aslam, F Alserhani, IU Awan, J Mellor
2009 International Conference on Advanced Information Networking and …, 2009
132009
A framework for multi-stage attack detection
F Alserhani
2013 Saudi International Electronics, Communications and Photonics …, 2013
122013
Multi-tier evaluation of network intrusion detection systems
F Alserhani, M Akhlaq, I Awan, J Mellor, AJ Cullen, P Mirchandani
Journal of Information Assurance and Security 5 (1), 10, 2010
102010
High speed NIDS using dynamic cluster and comparator logic
M Akhlaq, F Alserhani, A Subhan, IU Awan, J Mellor, P Mirchandani
2010 10th IEEE International Conference on Computer and Information …, 2010
82010
Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment
M Akhlaq, F Alserhani, IU Awan, J Mellor, AJ Cullen, P Mirchandani
Information Security and Digital Forensics: First International Conference …, 2010
82010
Smart logic-preventing packet loss in high speed network intrusion detection systems
A Subhan, M Akhlaq, F Alserhani, IU Awan, J Mellor, AJ Cullen, ...
Information Security and Digital Forensics: First International Conference …, 2010
62010
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency
M Humayun, A Alsirhani, F Alserhani, M Shaheen, G Alwakid
Journal of Cloud Computing 13 (1), 37, 2024
42024
Scalable and robust intrusion detection system to secure the iot environments using software defined networks (SDN) enabled architecture
TM Alshammari, FM Alserhani
Int. J. Comput. Networks Appl 9 (6), 678-688, 2022
42022
Prediction Models to Effectively Detect Malware Patterns in the IoT Systems
RN Alhamad, FM Alserhani
International Journal of Advanced Computer Science and Applications 13 (7), 2022
22022
Knowledge-based model to represent security information and reason about multi-stage attacks
FM Alserhani
Advanced Information Systems Engineering Workshops: CAiSE 2015 International …, 2015
22015
Collaborative Federated Learning-Based Model for Alert Correlation and Attack Scenario Recognition
HK Alkhpor, FM Alserhani
Electronics 12 (21), 4509, 2023
12023
Virtualization in Network Intrusion Detection Systems
M Akhlaq, F Alserhani, IU Awan, AJ Cullen, J Mellor, P Mirchandani
On the Move to Meaningful Internet Systems: OTM 2009 Workshops: Confederated …, 2009
12009
A fog-edge-enabled intrusion detection system for smart grids
N Tariq, A Alsirhani, M Humayun, F Alserhani, M Shaheen
Journal of Cloud Computing 13 (1), 43, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20