Skip Ribbon Commands
Skip to main content
   YU Faculty Websites>>  Dr. Ahmed Aleroud Sign In
Use SHIFT+ENTER to open the menu (new window).
  
  
  
  
  
  
  
An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data SensingS. Samarah, M. GH. Al Zamil, A. F. AlEroud, M. Rawashdeh, M. F. Alhamid and A. AlamriIEEE Access (ISI, IF:1.27)IEEE2017
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection ApproachAhmed Aleroud and George KarabatisIEEE Transactions on Systems, Man, and Cybernetics: Systems(ISI IF 1.60)IEEE 2016
Multimode co-clustering for analyzing terrorist networksAhmed AlEroud and Aryya  GangopadhyayInformation Systems Frontiers(ISI IF: 1.45)Springer2016
Identifying Cyber-Attacks on Software Defined Networks: An Inference-based Intrusion Detection ApproachAhmed Aleroud and Izzat AlsmadiJournal of Network and Computer Applications (ISI, IF:2.331)Elsevier2016
Contextual Information Fusion for Intrusion Detection: a Survey and TaxonomyAhmed Aleroud and George KarabatisKnowledge and Information Systems (ISI, IF:1.70)Springer2016
Context and Semantics for Detection of Cyber AttacksAhmed Aleroud and George KarabatisInt. J. Information and Computer SecurityInderscience Publishers2015
A hybrid Approach to Detecting Alerts in e-mail messagesQasem Al-Radaideh, Ahmed AlEroud, and E Al-ShawakfaJournal of Information Science (ISI: IF:0.89)Sage2013
Examining Web Search Trends across Arab Countries,M. Al-Kabi; A. Wahbeh; A. Alsobeh; A. Al-Eroud; I. AlsmadiArabian Journal for Science and Engineering(ISI IF:0.72)Springer2012
Evaluating Google queries based on language preferencesA. AlEroud, M. AlRamahi, M. Al-Kabi, I. Alsmadi, and E. Al-Shawakfa.Journal of Information Science (ISI IF:89)Sage2011
Fault-based Testing for Discovering SQL Injection Vulnerabilities in Web ApplicationsIzzat Asmadi, Ahmad A. Saifan,  Ahmed Aleroud International Journal of Information and Computer SecurityInderScience2018
Phishing environments, techniques, and countermeasures: a surveyAhmed Aleroud and Lina ZhouComputers & Security (ISI IF:2.650)68(160-196)Elsevier 2017