Ameer Al-Nemrat
Ameer Al-Nemrat
Senior Lecturer in Computer Science, University of East London
Verified email at uel.ac.uk
TitleCited byYear
Cybercrime classification and characteristics
H Jahankhani, A Al-Nemrat, A Hosseinian-Far
Cyber Crime and Cyber Terrorism Investigator's Handbook, 149-164, 2014
222014
Cyber crime and cyber terrorism investigator's handbook
B Akhgar, A Staniforth, F Bosco
Syngress, 2014
192014
Fast authentication in wireless sensor networks
C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab
Future Generation Computer Systems 55, 362-375, 2016
162016
Examination of cyber-criminal behaviour
H Jahankhani, A Al-Nemrat
International Journal of Information Science and Management (IJISM), 41-48, 2012
142012
Malicious Code Detection Using Penalized Splines on OPcode Frequency
M Alazab, MA Kadiri, S Venkatraman, A Al-Nemrat
IEEE 3rd Cybercrime & Trustworthy Computing Workshop, CTC 2012, Sydney …, 2012
122012
Sustainability in information systems auditing
AABLA Rahman, A Al-Nemrat, DS Preston
European Scientific Journal, 2014
102014
Analysing Human Factors for an Effective Information Security Management System
R Alavi, S Islam, H Jahankhani, A Al-Nemrat
International Journal of Security Software Engineering (IJSSE), Special …, 2012
102012
Analysis of Malware Behaviour: Using Data Mining Clustering Techniques to Support Forensics Investigation
EI Edem, C Benzaďd, A Al-Nemrat, P Watters
2014 Fifth Cybercrime and Trustworthy Computing Conference, 54-63, 2014
92014
Cybercrime Victimisations/Criminalisation and Punishment
A Al-Nemrat, H Jahankhani, DS Preston
Global Security, Safety, and Sustainability 92 (1), 55-62, 2010
92010
Deep Learning Approach for Intelligent Intrusion Detection System
R Vinayakumar, M Alazab, KP Soman, P Poornachandran, A Al-Nemrat, ...
IEEE Access 7, 41525-41550, 2019
82019
Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
F Amuchie, A Al-Nemrat, M Alazab, R Layton
IEEE 3rd Cybercrime & Trustworthy Computing Workshop, CTC 2012, Sydney …, 2012
82012
Cybercrime profiling and trend analysis
H Jahankhani, A Al-Nemrat
Intelligence Management, 181-197, 2011
82011
An Analysis of Honeypot Programs and the Attack Data Collected
C Moore, A Al-Nemrat
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015
72015
ARP Cache Poisoning Mitigation and Forensics Investigation
AH Mangut, A Al-Nemrat, A Benzaid, Chafika, Tawil
The 14th IEEE International Conference on Trust, Security and Privacy in …, 2015
72015
Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework
M Aiash, G Mapp, A Lasebae, A Al-Nemrat
In Computer Networks & Communications (NetCom), 125-136, 2012
72012
Sufficiency of windows event log as evidence in digital forensics
NM Ibrahim, A Al-Nemrat, H Jahankhani, R Bashroush
Global Security, Safety and Sustainability & e-Democracy, 253-262, 2011
72011
Global e-security
H Jahankhani, A Al-Nemrat
Global E-Security 12 (1), 3-9, 2008
62008
Variance ranking attributes selection techniques for binary classification problem in imbalance data
SH Ebenuwa, MS Sharif, M Alazab, A Al-Nemrat
IEEE Access 7, 24649-24666, 2019
52019
A scalable malware classification based on integrated static and dynamic features
T Bounouh, Z Brahimi, A Al-Nemrat, C Benzaid
International Conference on Global Security, Safety, and Sustainability, 113-124, 2017
52017
Password Guessing attacks: Analysis and Discovery of Evidence in Computer Forensic Investigation
D Gabi, A Al-Nemrat
proceedings of the 2nd International Conference on Cybercrime, Security and …, 2012
52012
The system can't perform the operation now. Try again later.
Articles 1–20