default search action
Ali Ahmed 0001
Person information
- affiliation: Victoria University of Wellington, Wellington, New Zealand
- affiliation (since 2013): Imam Muhammad Ibn Saud Islamic University, Riyadh, Saudi Arabia
- affiliation (2011 - 2013): Monash University Malaysia Campus, Bandar Sunway, Selangor, Malaysia
- affiliation (PhD 2010): University of Manchester, UK
Other persons with the same name
- Ali Ahmed — disambiguation page
- Ali Ahmed 0002 — Concordia University, Montreal, QC, Canada
- Ali Ahmed 0003 — Universitii Teknologi Malaysia
- Ali Ahmed 0004 — Information Technology University, Department of Electrical Engineering, Lahore, Pakistan (and 3 more)
- Ali Ahmed 0005 — Hanyang University, Department of Electronics and Communication Engineering, Gyeonggi-do, South Korea
- Ali Ahmed 0006 — Minufiya University, Faculty of Computers and Information, Shebin el Kom, Egypt
- Ali Ahmed 0007 — King Abdulaziz University, Rabigh, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Ali Ahmed, Victor Ungureanu, Tarek Gaber, Craig A. Watterson, Fatma Masmoudi:
Smart Home Privacy: A Scoping Review. ICISSP 2024: 635-642 - 2023
- [c19]Yalan Zhang, Ali Ahmed, Hai-Ning Liang, Nilufar Baghaei:
Exploring the Transformative Potential of Virtual Reality in History Education: A Scoping Review. ICWL 2023: 107-121 - [c18]Georg Grabner, Ali Ahmed, Nilufar Baghaei:
Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S). SEKE 2023: 380-385 - 2022
- [c17]Ali Ahmed, Karsten Lundqvist, Jennifer Ferreira, Craig A. Watterson:
Reflections on Agile Software Development: A Conversion Master Case study. FIE 2022: 1-8 - 2021
- [c16]Simon Applebaum, Tarek Gaber, Ali Ahmed:
Signature-based and Machine-Learning-based Web Application Firewalls: A Short Survey. ACLING 2021: 359-367 - [c15]Ali Ahmed, Craig A. Watterson, Karsten Lundqvist, Jennifer Ferreira:
Online Student Supervision: A Reflective Study on Lessons and Challenges. FIE 2021: 1-7 - [c14]Carlo Farinella, Ali Ahmed, Craig A. Watterson:
Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility. TrustCom 2021: 701-709 - 2020
- [c13]Philipp Tschannen, Ali Ahmed:
On the Evaluation of the Security Usability of Bitcoin's APIs. EASE 2020: 405-412 - [c12]Tarek Gaber, Ali Ahmed, Amira Mostafa:
PrivDRM: A Privacy-preserving Secure Digital Right Management System. EASE 2020: 481-486 - [c11]Ali Ahmed, Karsten Lundqvist, Craig A. Watterson, Nilufar Baghaei:
Teaching Cyber-Security for Distance Learners: A Reflective Study. FIE 2020: 1-7 - [c10]Yousef Ballan, Ali Ahmed, Nilufar Baghaei:
LAMCO: A Layered Approach to Mobile Application Computation Offloading. IWCMC 2020: 1336-1341
2010 – 2019
- 2019
- [c9]Karsten Lundqvist, Ali Ahmed, Dana Fridman, Jean-Grégoire Bernard:
Interdisciplinary Agile Teaching. FIE 2019: 1-8 - 2017
- [j2]Reinhard Behrens, Ali Ahmed:
A Security Architecture for the Internet of Things. KSII Trans. Internet Inf. Syst. 11(12): 6092-6115 (2017) - [c8]Reinhard Behrens, Ali Ahmed:
Internet of Things: An end-to-end security layer. ICIN 2017: 146-149 - 2016
- [c7]Ali Ahmed, David Booth:
The Digital Privacy Laws and Practices in the Jersey Island. EUSPN/ICTH 2016: 163-168 - 2015
- [c6]Ali Ahmed, Saadat M. Alhashmi:
A metric for Literature-Based Discovery methodology evaluation. AICCSA 2015: 1-5 - [c5]Bader Said Rashid Al-Farsi, Ali Ahmed, Saadat M. Alhashmi:
The School Absenteeism Contributing Factors: Oman as a Case Study. ECC 2015: 215-224 - [c4]Ahmed Abed, Ali Ahmed, Saadat M. Alhashmi:
IPv6 Adoption in the Kingdom of Saudi Arabia. ECC 2015: 335-346 - [c3]Noha Ragab, Ali Ahmed, Saadat M. Alhashmi:
Software Engineering for Security as a Non-functional Requirement. ECC 2015: 347-357 - 2010
- [j1]Ali Ahmed, Ning Zhang:
Towards the realisation of context-risk-aware access control in pervasive computing. Telecommun. Syst. 45(2-3): 127-137 (2010) - [c2]Ali Ahmed, Ning Zhang:
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. SECURWARE 2010: 251-260
2000 – 2009
- 2008
- [c1]Ali Ahmed, Ning Zhang:
A Context-Risk-Aware Access Control model for Ubiquitous environments. IMCSIT 2008: 775-782
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint