Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ghafir, Ibrahim
add a person with the name Ghafir, Ibrahim
 

Other publications of authors with the same name

Social Engineering Attack Strategies and Defence Approaches., , , and . FiCloud, page 145-149. IEEE Computer Society, (2016)Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain., , , and . ICFNDS, page 27:1-27:5. ACM, (2019)Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat., , , , , and . ICFNDS, page 44:1-44:5. ACM, (2018)A machine-learning-based system for real-time advanced persistent threat detection and prediction.. Manchester Metropolitan University, UK, (2017)British Library, EThOS.A Survey on Network Security Monitoring Systems., , , and . FiCloud Workshops, page 77-82. IEEE Computer Society, (2016)An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processes., , , , and . ICFNDS, page 37:1-37:8. ACM, (2017)Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information., , , , , and . ICIN, page 188-194. IEEE, (2019)Anomaly-Based Network Intrusion Detection Using SVM., , , , , and . WCSP, page 1-6. IEEE, (2019)The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey., , , , , , and . Sensors, 19 (8): 1788 (2019)Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence., , , , and . ICFNDS, page 27. ACM, (2017)