Monitoring enterprise DNS queries for detecting data exfiltration from internal hosts J Ahmed, HH Gharakheili, Q Raza, C Russell, V Sivaraman IEEE Transactions on Network and Service Management 17 (1), 265-279, 2019 | 66 | 2019 |
Real-time detection of DNS exfiltration and tunneling from enterprise networks J Ahmed, HH Gharakheili, Q Raza, C Russell, V Sivaraman 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 66 | 2019 |
Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions Z Shah, A Levula, K Khurshid, J Ahmed, I Ullah, S Singh | 33 | 2021 |
A measurement study of open source SDN layers in OpenStack under network perturbation A Malik, J Ahmed, J Qadir, MU Ilyas Computer Communications 102, 139-149, 2017 | 21 | 2017 |
Automatic detection of DGA-enabled malware using SDN and traffic behavioral modeling J Ahmed, HH Gharakheili, C Russell, V Sivaraman IEEE Transactions on Network Science and Engineering 9 (4), 2922-2939, 2022 | 13 | 2022 |
Instance launch-time analysis of OpenStack virtualization technologies with control plane network errors J Ahmed, A Malik, MU Ilyas, JS Alowibdi Computing 101, 989-1014, 2019 | 8 | 2019 |
Identifying DNS exfiltration based on lexical attributes of query name I Jawad, J Ahmed, I Razzak, R Doss 2021 International Joint Conference on Neural Networks (IJCNN), 1-7, 2021 | 6 | 2021 |
Demo Abstract: A Tool to Detect and Visualize Malicious DNS Queries for Enterprise Networks J Ahmed, HH Gharakheili, Q Raza, C Russell, V Sivaraman 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 4 | 2019 |
Monitoring Security of Enterprise Hosts via DNS Data Analysis J Ahmed http://arxiv.org/abs/2205.08968, 1-165, 2022 | 3 | 2022 |
Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems AS Musleh, J Ahmed, N Ahmed, H Xu, G Chen, J Hu, S Jha 2023 IEEE International Conference on Communications, Control, and Computing …, 2023 | 1 | 2023 |
Learning-Based Detection of Malicious Hosts by Analyzing Non-Existent DNS Responses J Ahmed, HH Gharakheili, V Sivaraman GLOBECOM 2022-2022 IEEE Global Communications Conference, 3411-3416, 2022 | 1 | 2022 |
Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts On the Australian Grid AS Musleh, J Ahmed, N Ahmed, H Xu, G Chen, S Kerr, S Jha IEEE Transactions on Smart Grid, 2024 | | 2024 |
A Comprehensive Threat Modelling Analysis for Distributed Energy Resources N Bhaskar, J Ahmed, R Masood, N Ahmed, S Kerr, SK Jha ACM Transactions on Cyber-Physical Systems, 2024 | | 2024 |
Scalable Deployment of OpenStack (Juno) on Ubuntu VMs Hosted on Microsoft Azure A Malik, J Ahmed, MU Ilyas | | 2015 |