Follow
Khaled Al-naami
Khaled Al-naami
Ph.D. Computer Science, The University of Texas at Dallas
No verified email
Title
Cited by
Cited by
Year
Adaptive encrypted traffic fingerprinting with bi-directional dependence
K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications†…, 2016
962016
Recurring and novel class detection using class-based ensemble for evolving data stream
T Al-Khateeb, MM Masud, KM Al-Naami, SE Seker, AM Mustafa, L Khan, ...
IEEE Transactions on Knowledge and Data Engineering 28 (10), 2752-2764, 2015
502015
GISQF: An efficient spatial query processing system
KM Al Naami, S Seker, L Khan
2014 IEEE 7th international conference on cloud computing, 681-688, 2014
372014
Ensemble classification over stock market time series and economy news
SE Seker, C Mert, K Al-Naami, U Ayan, N Ozalp
2013 IEEE International Conference on Intelligence and Security Informatics†…, 2013
352013
Bimorphing: A bi-directional bursting defense against website fingerprinting attacks
K Al-Naami, A El-Ghamry, MS Islam, L Khan, B Thuraisingham, ...
IEEE Transactions on Dependable and Secure Computing 18 (2), 505-517, 2019
322019
Sentimental analysis on Turkish blogs via ensemble classifier
SE Seker, K Al-Naami
Proc. the 2013 International Conference on Data Mining, 10-16, 2013
302013
Time series analysis on stock market for text mining correlation of economy news
SE Seker, C Mert, K Al-Naami, N Ozalp, U Ayan
International Journal of Social Sciences and Humanity Studies 6 (1), 69-91, 2013
282013
Unsupervised deep embedding for novel class detection over data stream
AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ...
2017 IEEE International Conference on Big Data (Big Data), 1830-1839, 2017
252017
Author attribution on streaming data
SE Seker, K Al-Naami, L Khan
2013 IEEE 14th International Conference on Information Reuse & Integration†…, 2013
212013
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS 3, 1-10, 2020
162020
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference†…, 2019
132019
P2V: Effective website fingerprinting using vector space representations
K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham
2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015
132015
Correlation between the economy news and stock market in Turkey
SE Seker, C Mert, K Al-Naami, N Ozalp, U Ayan
International Journal of Business Intelligence Research (IJBIR) 4 (4), 1-21, 2013
82013
GISQAF: MapReduce guided spatial query processing and analytics system
KM Al‐Naami, SE Seker, L Khan
Software: Practice and Experience 46 (10), 1329-1349, 2016
72016
Crook-sourced intrusion detection as a service
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Journal of Information Security and Applications 61, 102880, 2021
32021
Correlation between Turkish stock market and economy news
Ş ŞEKER, N ÷zalp, K Al-Naami, C Mert, Z Erdem
22013
Enhancing Cybersecurity with Encrypted Traffic Fingerprinting
KM Al Naami
2017
2016 Index IEEE Transactions on Knowledge and Data Engineering Vol. 28
PJ Abad, L Abdi, A Abello, A Adiga, PK Agarwal, C Aggarwal, M Aggarwal, ...
IEEE Transactions on Knowledge and Data Engineering 29 (1), 2017
2017
Time Series Analysis on Stock Market for Text Mining Correlation of Economy News
S Evren Seker, C Mert, K Al-Naami, N Ozalp, U Ayan
arXiv e-prints, arXiv: 1403.2002, 2014
2014
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18
S Adepu, A Agarwal, G Ahn, S Akter, MA Al Faruque, M Al-Asli, ...
The system can't perform the operation now. Try again later.
Articles 1–20