Ahmed AlEroud, Ph.D.

Affiliations: 
2014 Information Systems University of Maryland, Baltimore County, Baltimore, MD, United States 
Area:
Information Science, Computer Science, Information Technology
Google:
"Ahmed AlEroud"

Parents

Sign in to add mentor
George Karabatis grad student 2014 UMBC
 (Contextual information fusion for the detection of cyberattack.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Alazzam I, Aleroud A, Latifah ZA, et al. (2020) Automatic Bug Triage in Software Systems Using Graph Neighborhood Relations for Feature Augmentation Ieee Transactions On Computational Social Systems. 1-16
Aleroud A, Alsheeh NA, Al-Shawakfa E. (2020) A Graph proximity Feature Augmentation Approach for Identifying Accounts of Terrorists on Twitter Computers & Security. 102056
Aleroud A, Gangopadhyay A. (2018) Multimode co-clustering for analyzing terrorist networks Information Systems Frontiers. 20: 1053-1074
AlEroud A, Karabatis G. (2017) Methods and techniques to identify security incidents using domain knowledge and contextual information Immunotechnology. 1040-1045
AlEroud A, Alsmadi I. (2017) Identifying cyber-attacks on software defined networks Journal of Network and Computer Applications. 80: 152-164
Aleroud A, Zhou L. (2017) Phishing environments, techniques, and countermeasures Computers & Security. 68: 160-196
Aleroud A, Karabatis G. (2017) Contextual information fusion for intrusion detection: a survey and taxonomy Knowledge and Information Systems. 52: 563-619
Aleroud A, Karabatis G, Sharma P, et al. (2014) Context and semantics for detection of cyber attacks International Journal of Information and Computer Security. 6: 63-92
Alsmadi I, AlEroud A. (2012) Toward Security Test Automation for Event Driven GUI Web Contents International Journal of Computer Network and Information Security. 4: 19-25
AlEroud A, Karabatis G. (2012) A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks Cybersecurity. 40-45
See more...