Khaled Al-naami
Khaled Al-naami
Ph.D. Computer Science, The University of Texas at Dallas
No verified email
Cited by
Cited by
Adaptive encrypted traffic fingerprinting with bi-directional dependence
K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Recurring and novel class detection using class-based ensemble for evolving data stream
T Al-Khateeb, MM Masud, KM Al-Naami, SE Seker, AM Mustafa, L Khan, ...
IEEE Transactions on Knowledge and Data Engineering 28 (10), 2752-2764, 2015
GISQF: An efficient spatial query processing system
KM Al Naami, S Seker, L Khan
2014 IEEE 7th international conference on cloud computing, 681-688, 2014
Ensemble classification over stock market time series and economy news
SE Seker, C Mert, K Al-Naami, U Ayan, N Ozalp
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
Bimorphing: A bi-directional bursting defense against website fingerprinting attacks
K Al-Naami, A El-Ghamry, MS Islam, L Khan, B Thuraisingham, ...
IEEE Transactions on Dependable and Secure Computing 18 (2), 505-517, 2019
Sentimental analysis on Turkish blogs via ensemble classifier
SE Seker, K Al-Naami
Proc. the 2013 International Conference on Data Mining, 10-16, 2013
Time series analysis on stock market for text mining correlation of economy news
SE Seker, M Cihan, ALN Khaled, N Ozalp, A Ugur
International Journal of Social Sciences and Humanity Studies 6 (1), 69-91, 2013
Unsupervised deep embedding for novel class detection over data stream
AM Mustafa, G Ayoade, K Al-Naami, L Khan, KW Hamlen, ...
2017 IEEE International Conference on Big Data (Big Data), 1830-1839, 2017
Author attribution on streaming data
SE Seker, K Al-Naami, L Khan
2013 IEEE 14th International Conference on Information Reuse & Integration …, 2013
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS 3, 1-10, 2020
P2v: Effective website fingerprinting using vector space representations
K Alnaami, G Ayoade, A Siddiqui, N Ruozzi, L Khan, B Thuraisingham
2015 IEEE Symposium Series on Computational Intelligence, 59-66, 2015
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
GISQAF: MapReduce guided spatial query processing and analytics system
KM Al‐Naami, SE Seker, L Khan
Software: Practice and Experience 46 (10), 1329-1349, 2016
Correlation between the economy news and stock market in Turkey
SE Seker, C Mert, K Al-Naami, N Ozalp, U Ayan
International Journal of Business Intelligence Research (IJBIR) 4 (4), 1-21, 2013
Correlation between Turkish stock market and economy news
Ş ŞEKER, N Özalp, K Al-Naami, C Mert, Z Erdem
Crook-sourced intrusion detection as a service
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Journal of Information Security and Applications 61, 102880, 2021
Enhancing Cybersecurity with Encrypted Traffic Fingerprinting
KM Al Naami
2016 Index IEEE Transactions on Knowledge and Data Engineering Vol. 28
PJ Abad, L Abdi, A Abello, A Adiga, PK Agarwal, C Aggarwal, M Aggarwal, ...
IEEE Transactions on Knowledge and Data Engineering 29 (1), 2017
Time Series Analysis on Stock Market for Text Mining Correlation of Economy News
S Evren Seker, C Mert, K Al-Naami, N Ozalp, U Ayan
arXiv e-prints, arXiv: 1403.2002, 2014
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18
S Adepu, A Agarwal, G Ahn, S Akter, MA Al Faruque, M Al-Asli, ...
The system can't perform the operation now. Try again later.
Articles 1–20