Network intrusion detection system based on recursive feature addition and bigram technique T Hamed, R Dara, SC Kremer computers & security 73, 137-155, 2018 | 117 | 2018 |
A survey and taxonomy of classifiers of intrusion detection systems T Hamed, JB Ernst, SC Kremer Computer and network security essentials, 21-39, 2018 | 63 | 2018 |
Improving the security of the medical images A Mahmood, T Hamed, C Obimbo, R Dony Int J Adv Comput Sci Appl 4 (9), 2013 | 43 | 2013 |
An accurate, fast embedded feature selection for SVMs T Hamed, R Dara, SC Kremer 2014 13th International conference on machine learning and applications, 135-140, 2014 | 33 | 2014 |
Intrusion detection in contemporary environments T Hamed, R Dara, SC Kremer Computer and Information Security Handbook, 109-130, 2017 | 31 | 2017 |
A survey and taxonomy on data and pre-processing techniques of intrusion detection systems T Hamed, JB Ernst, SC Kremer Computer and network security essentials, 113-134, 2018 | 24 | 2018 |
A survey and comparison of performance evaluation in intrusion detection systems J Ernst, T Hamed, S Kremer Computer and network security essentials, 555-568, 2018 | 13 | 2018 |
Recursive feature addition: A novel feature selection technique, including a proof of concept in network security T Hamed University of Guelph, 2017 | 6 | 2017 |
Storming the cloud: A look at denial of service in the Google App Engine B Ferriman, T Hamed, QH Mahmoud 2015 International Conference on Computing, Networking and Communications …, 2015 | 5 | 2015 |
Particle swarm optimization for adaptive social-distance of neighborhood in the IoT and COVID-19 era MZ Hasan, TY Hamed, F Al-Turjman 2021 International Conference on Artificial Intelligence of Things (ICAIoT …, 2021 | 2 | 2021 |
Machine Learning based–System for Predicting Mastitis in Dairy Cows AS Mahmood, TY Hamed 2022 8th International Conference on Contemporary Information Technology and …, 2022 | | 2022 |
ICAIoT 2021 J Rasheed, MZ Hasan, TY Hamed, A Rasheed, B Bilgehan, O Mirzaei, ... | | |