关注
Ali Hur
Ali Hur
PhD Researcher
在 our.ecu.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Semantic security against web application attacks
A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth
Information Sciences 254, 19-38, 2014
1012014
Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications
A Razzaq, A Hur, HF Ahmad, M Masood
2013 IEEE Eleventh International Symposium on Autonomous Decentralized …, 2013
792013
EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments
M Masood, Z Anwar, SA Raza, MA Hur
INMIC, 37-42, 2013
652013
Critical analysis on web application firewall solutions
A Razzaq, A Hur, S Shahbaz, M Masood, HF Ahmad
2013 IEEE Eleventh International Symposium on Autonomous Decentralized …, 2013
532013
Ontology based application level intrusion detection system by using bayesian filter
A Razzaq, HF Ahmed, A Hur, N Haider
2009 2nd International Conference on Computer, Control and Communication, 1-6, 2009
322009
A survey on state-of-the-art techniques for knowledge graphs construction and challenges ahead
A Hur, N Janjua, M Ahmed
2021 IEEE Fourth International Conference on Artificial Intelligence and …, 2021
302021
Multi-layered defense against web application attacks
A Razzaq, A Hur, N Haider, F Ahmad
2009 Sixth International Conference on Information Technology: New …, 2009
182009
Foundation of semantic rule engine to protect web application attacks
A Razzaq, A Hur, M Masood, K Latif, HF Ahmad, H Takahashi
2011 Tenth International Symposium on Autonomous Decentralized Systems, 95-102, 2011
172011
Towards augmented proactive cyberthreat intelligence
T Khan, M Alam, A Akhunzada, A Hur, M Asif, MK Khan
Journal of Parallel and Distributed Computing 124, 47-59, 2019
132019
Formal reasoning of web application firewall rules through ontological modeling
A Ahmad, Z Anwar, A Hur, HF Ahmad
2012 15th International Multitopic Conference (INMIC), 230-237, 2012
112012
Detect HTTP specification attacks using ontology
RF Munir, N Ahmed, A Razzaq, A Hur, F Ahmad
2011 Frontiers of Information Technology, 75-78, 2011
72011
Strong key machanism generated by LFSR based Vigenère cipher
A Razzaq, Y Mahmood, F Ahmed, A Hur
Int. Arab Conf. Inf. Technol, 554-548, 2012
62012
H Farooq AHMAD a Muddassar MASOOD, 2013. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications
A RAZZAQ, HUR Ali
2013 IEEE Eleventh International Symposium on Autonomous Decentralized …, 2013
22013
Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP
A Hur, N Janjua, M Ahmed
Expert Systems With Applications 239, 122269, 2024
12024
Semantic Architecture for Web applicationn Security
A Razzaq, A Hur, HF Ahmad, M Masood
International Journal of Computer Science Issues (IJCSI) 9 (2), 435, 2012
2012
系统目前无法执行此操作,请稍后再试。
文章 1–15