default search action
Ejaz Ahmed
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Ejaz Ahmed 0001 — University of Bedfordshire, UK (and 1 more)
- Ejaz Ahmed 0002 — University of Maryland, College Park, MD, USA
- Ejaz Ahmed 0003 — University of Malaya, Centre for Research in Mobile Cloud Computing, Kuala Lumpur, Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Arash Mahboubi, Khanh Luong, Hamed Aboutorab, Hang Thanh Bui, Geoff Jarrad, Mohammed Bahutair, Seyit Camtepe, Ganna Pogrebna, Ejaz Ahmed, Bazara I. A. Barry, Hannah Gately:
Evolving techniques in cyber threat hunting: A systematic review. J. Netw. Comput. Appl. 232: 104004 (2024) - 2023
- [c14]Zian Liu, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
WinkFuzz: Model-based Script Synthesis for Fuzzing. ASSS@AsiaCCS 2023: 2:1-2:12 - [c13]Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae H. Kim, Carrie Spiker, Blake Harnden:
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks via Multi-Agent Deep Reinforcement Learning. MILCOM 2023: 51-56 - [c12]Melissa Elkadi, Deokseong Kim, Ejaz Ahmed, Anh Le, Moein Sadeghi, Paul Russell, Bo Ryu:
Open Source-Based Over-the-Air 5G New Radio Sidelink Testbed. MILCOM 2023: 63-70 - [i5]Melissa Elkadi, Doekseong Kim, Ejaz Ahmed, Moein Sadeghi, Anh Le, Paul Russell, Bo Ryu:
Open Source-based Over-The-Air 5G New Radio Sidelink Testbed. CoRR abs/2306.09286 (2023) - [i4]Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae H. Kim, Carrie Spiker, Blake Harnden:
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks through Multi-Agent Deep Reinforcement Learning. CoRR abs/2306.09637 (2023) - [i3]Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu:
VulMatch: Binary-level Vulnerability Detection Through Signature. CoRR abs/2308.00288 (2023) - 2022
- [c11]Zian Liu, Chao Chen, Ejaz Ahmed, Dongxi Liu, Jun Zhang:
Automated Binary Analysis: A Survey. ICA3PP 2022: 392-411 - 2021
- [c10]Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim:
DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks. MILCOM 2021: 31-36 - [i2]Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim:
Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for MANETs. CoRR abs/2101.03273 (2021) - [i1]Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim:
DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks. CoRR abs/2111.15013 (2021)
2010 – 2019
- 2019
- [j8]Lei Li, Anand N. Vidyashankar, Guoqing Diao, Ejaz Ahmed:
Robust Inference after Random Projections via Hellinger Distance for Location-Scale Family. Entropy 21(4): 348 (2019) - [j7]Asima Hameed, Sara Masood, Aamir Hameed, Ejaz Ahmed, Ahsan Sharif, Muhammad Imran Abdullah:
Anti-malarial, cytotoxicity and molecular docking studies of quinolinyl chalcones as potential anti-malarial agent. J. Comput. Aided Mol. Des. 33(7): 677-688 (2019) - 2018
- [j6]Ejaz Ahmed, Periklis Chatzimisios, Brij Bhooshan Gupta, Yaser Jararweh, Houbing Song:
Recent advances in fog and mobile edge computing. Trans. Emerg. Telecommun. Technol. 29(4) (2018) - [j5]Ejaz Ahmed, Hamid Gharavi:
Cooperative Vehicular Networking: A Survey. IEEE Trans. Intell. Transp. Syst. 19(3): 996-1014 (2018) - 2016
- [j4]Fazil Abdullah, Rupert Ward, Ejaz Ahmed:
Investigating the influence of the most commonly used external variables of TAM on students' Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios. Comput. Hum. Behav. 63: 75-90 (2016) - [j3]Ejaz Ahmed, Rupert Ward:
Analysis of factors influencing acceptance of personal, academic and professional development e-portfolios. Comput. Hum. Behav. 63: 152-161 (2016) - [c9]Yaser Jararweh, Ahmad Doulat, Omar AlQudah, Ejaz Ahmed, Mahmoud Al-Ayyoub, Elhadj Benkhelifa:
The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing. ICT 2016: 1-5 - 2014
- [c8]Nishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo:
Poisoned GOOSE: Exploiting the GOOSE Protocol. AISC 2014: 17-22 - 2013
- [j2]Ghulam Gilanie, Muhammad Attique, Hafeez Ullah, Shahid Naweed, Ejaz Ahmed, Masroor Ikram:
Object extraction from T2 weighted brain MR image using histogram based gradient calculation. Pattern Recognit. Lett. 34(12): 1356-1363 (2013) - 2012
- [j1]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, Ejaz Ahmed:
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Secur. Commun. Networks 5(2): 125-144 (2012) - 2011
- [c7]Sajal Bhatia, George M. Mohay, Alan Tickle, Ejaz Ahmed:
Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event. ARES 2011: 210-217 - 2010
- [c6]Desmond Allan Schmidt, Suriadi Suriadi, Alan Tickle, Andrew J. Clark, George M. Mohay, Ejaz Ahmed, James Mackie:
A Distributed Denial of Service Testbed. HCC 2010: 338-349 - [c5]Suriadi Suriadi, Alan Tickle, Ejaz Ahmed, Jason Smith, Hasmukh Morarji:
Risk Modelling the Transition of SCADA System to IPv6. HCC 2010: 384-395 - [c4]Ejaz Ahmed, George M. Mohay, Alan Tickle, Sajal Bhatia:
Use of IP Addresses for High Rate Flooding Attack Detection. SEC 2010: 124-135
2000 – 2009
- 2009
- [c3]Ejaz Ahmed, Andrew J. Clark, George M. Mohay:
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. NordSec 2009: 104-119 - 2008
- [c2]Ejaz Ahmed, Andrew J. Clark, George M. Mohay:
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. NPC Workshops 2008: 168-175 - 2005
- [c1]Ahmad Ali Iqbal, Waqar Mahmood, Ejaz Ahmed:
TCP-DR an Effective Protocol for Infrastructure based Wireless Networks. ICWN 2005: 237-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint