Follow
Ibrahim Ghafir
Title
Cited by
Cited by
Year
Detection of advanced persistent threat using machine-learning correlation analysis
I Ghafir, M Hammoudeh, V Prenosil, L Han, R Hegarty, K Rabie, ...
Future Generation Computer Systems 89, 349-359, 2018
2752018
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi, T Baker, M Hammoudeh, ...
Sensors 19 (8), 1788, 2019
2622019
Security threats to critical infrastructure: the human factor
I Ghafir, J Saleem, M Hammoudeh, H Faour, V Prenosil, S Jaf, S Jabbar, ...
The Journal of Supercomputing, 1-17, 2018
2392018
A survey on network security monitoring systems
I Ghafir, V Prenosil, J Svoboda, M Hammoudeh
2016 IEEE 4th International Conference on Future Internet of Things and …, 2016
1232016
Social engineering attack strategies and defence approaches
I Ghafir, V Prenosil, A Alhejailan, M Hammoudeh
2016 IEEE 4th International Conference on Future Internet of Things and …, 2016
1202016
Advanced persistent threat attack detection: An overview
I Ghafir, V Prenosil
International Journal of Advances in Computer Networks and Its Security (IJCNS), 2014
1012014
BotDet: A system for real time botnet command and control traffic detection
I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar, S Khalid, S Jaf
IEEE Access 6, 38947-38958, 2018
822018
Network monitoring approaches: An overview
J Svoboda, I Ghafir, V Prenosil
International Journal of Advances in Computer Networks and Its Security …, 2015
822015
Hidden Markov models and alert correlations for the prediction of advanced persistent threats
I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ...
IEEE Access 7, 99508-99520, 2019
722019
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence
I Ghafir, V Prenosil, M Hammoudeh, L Han, U Raza
Proceedings of the International Conference on Future Networks and …, 2017
562017
Blacklist-based malicious ip traffic detection
I Ghafir, V Prenosil
2015 Global Conference on Communication Technologies (GCCT), 229-233, 2015
562015
Proposed approach for targeted attacks detection
I Ghafir, V Prenosil
Advanced Computer and Communication Engineering Technology, 73-80, 2016
552016
Tor-based malware and Tor connection detection
I Ghafir, J Svoboda, V Prenosil
IET Digital Library, 2014
482014
A survey on botnet command and control traffic detection
I Ghafir, J Svoboda, V Prenosil
International Journal of Advances in Computer Networks and its security …, 2015
452015
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat
I Ghafir, V Prenosil, M Hammoudeh, FJ Aparicio-Navarro, K Rabie, ...
Proceedings of the 2nd International Conference on Future Networks and …, 2018
432018
DNS traffic analysis for malicious domains detection
I Ghafir, V Prenosil
2015 2nd International Conference on Signal Processing and Integrated …, 2015
412015
Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution
I Ghafir, V Prenosil, M Hammoudeh
theIRED, 2016
402016
Malicious file hash detection and drive-by download attacks
I Ghafir, V Prenosil
Proceedings of the Second International Conference on Computer and …, 2016
402016
Anomaly Detection Using Dynamic Time Warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
2019 IEEE International Conference on Computational Science and Engineering …, 2019
382019
Multi-stage attack detection using contextual information
FJ Aparicio-Navarro, KG Kyriakopoulos, I Ghafir, S Lambotharan, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-9, 2018
362018
The system can't perform the operation now. Try again later.
Articles 1–20