default search action
Ahmed Patel
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j88]Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, Alwi M. Bamhdi, Ana Luiza Bessa Barros, Djamel Zeghida, Ahmed Patel:
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. Clust. Comput. 28(1): 58 (2025) - 2023
- [j87]Tiago Linhares, Ahmed Patel, Ana Luiza Bessa de Paula Barros, Marcial Fernández:
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN). J. Netw. Syst. Manag. 31(3): 55 (2023) - [c42]Ilane Karise Barbosa Cunha, Joaquim Celestino Júnior, Marcial Porto Fernandez, Ahmed Patel, Maxwell E. Monteiro:
VNDN-Fuzzy - A strategy to mitigate the forwarding interests broadcast storm problem in VNDN networks. ICOIN 2023: 263-270 - 2020
- [j86]Tiago Portela de Souza, Maxwell E. Monteiro, Jefferson Rodrigo A. Cavalcante, Joaquim Celestino Jr., Ahmed Patel:
An extended software defined optical networks slicing architecture. Comput. Stand. Interfaces 70: 103428 (2020) - [j85]Ayman Jaradat, Hitham Alhussian, Ahmed Patel, Suliman Mohamed Fati:
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach. Comput. Stand. Interfaces 71: 103432 (2020) - [j84]Yahia Baashar, Hitham Alhussian, Ahmed Patel, Gamal Alkawsi, Ahmed Ibrahim Alzahrani, Osama Alfarraj, Gasim Hayder:
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review. Comput. Stand. Interfaces 71: 103442 (2020)
2010 – 2019
- 2019
- [j83]Hitham Alhussian, Nordin Zakaria, Ahmed Patel, Ayman Jaradat, Said Jadid Abdulkadir, Abdelaziz Yousif Ahmed, Hussein T. Bahbouh, Sallam Osman Fageeri, Asim Abdallah Elsheikh, Junzo Watada:
Investigating the Schedulability of Periodic Real-Time Tasks in Virtualized Cloud Environment. IEEE Access 7: 29533-29542 (2019) - [j82]Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel, Norhamadi Ja'affar:
A review of security assessment methodologies in industrial control systems. Inf. Comput. Secur. 27(1): 47-61 (2019) - [c41]Francisco Leonardo Jales Martins, Joaquim Celestino Jr., Rafael L. Gomes, Ahmed Patel, Nazim Agoulmine:
BE-SYS: Big Data E-Health System for Analysis and Detection of Risk of Septic Shock in Adult Patients. ICC 2019: 1-6 - [c40]Omar A. Abdulkader, Alwi M. Bamhdi, Vijey Thayananthan, Kamal Mansur Jambi, Bandar Al-Ghamdi, Ahmed Patel:
A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server. ICICT (1) 2019: 375-384 - [c39]Jefferson Rodrigo A. Cavalcante, Alex F. R. Trajano, Lucas Leite, Miguel F. Mariano, Joaquim Celestino Júnior, Ahmed Patel, José Neuman de Souza:
Securing IPv6 Wireless Networks Against Malicious Router Advertisements. PIMRC 2019: 1-6 - 2018
- [c38]Jefferson Rodrigo A. Cavalcante, Joaquim Celestino Júnior, Ahmed Patel:
Alarm Mechanism for Anticipated Detection of Network Unavailability in IP Networks Through Time Series Analysis. AINA 2018: 181-188 - [c37]Francisco R. P. da Ponte, Rafael L. Gomes, Joaquim Celestino Jr., Edmundo R. M. Madeira, Ahmed Patel:
IoT Device Programmable Language Customization for Home Automation. ISCC 2018: 168-173 - 2017
- [j81]Ahmed Patel, Hitham Alhussian, Jens Myrup Pedersen, Bouchaib Bounabat, Joaquim Celestino Júnior, Sokratis K. Katsikas:
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Comput. Secur. 64: 92-109 (2017) - [j80]Ilane Cunha, Jefferson Rodrigo A. Cavalcante, Ahmed Patel:
A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution. Int. J. Electron. Secur. Digit. Forensics 9(3): 209-238 (2017) - [c36]Jefferson Rodrigo A. Cavalcante, Ahmed Patel, Joaquim Celestino Jr.:
Performance Management of Optical Transport Networks through Time Series Forecasting. AINA 2017: 152-159 - [c35]Tiago Portela de Souza, Jefferson Rodrigo A. Cavalcante, Ahmed Patel, Maxwell E. Monteiro, Joaquim Celestino Jr.:
SONA: Software Defined Optical Networks Slicing Architecture. AINA 2017: 654-661 - 2016
- [j79]Sarvesh Rawat, Ahmed Patel, Joaquim Celestino Jr., André Luiz Moura dos Santos:
A dominance based rough set classification system for fault diagnosis in electrical smart grid environments. Artif. Intell. Rev. 46(3): 389-411 (2016) - [j78]Hitham Alhussian, Nordin Zakaria, Ahmed Patel:
An unfair semi-greedy real-time multiprocessor scheduling algorithm. Comput. Electr. Eng. 50: 143-165 (2016) - [j77]Ali Seyfi, Ahmed Patel:
A focused crawler combinatory link and content model based on T-Graph principles. Comput. Stand. Interfaces 43: 1-11 (2016) - [j76]Ali Seyfi, Ahmed Patel, Joaquim Celestino Júnior:
Empirical evaluation of the link and content-based focused Treasure-Crawler. Comput. Stand. Interfaces 44: 54-62 (2016) - [j75]João Gonçalves Filho, Ahmed Patel, Bruno Lopes Alcantara Batista, Joaquim Celestino Júnior:
A systematic technical survey of DTN and VDTN routing protocols. Comput. Stand. Interfaces 48: 139-159 (2016) - [i2]Ibrahim AlShourbaji, Samaher Al-Janabi, Ahmed Patel:
Document Selection in a Distributed Search Engine Architecture. CoRR abs/1603.09434 (2016) - 2015
- [j74]Ahmed Patel, Samaher Al-Janabi, Ibrahim AlShourbaji, Jens Myrup Pedersen:
A novel methodology towards a trusted environment in mashup web applications. Comput. Secur. 49: 107-122 (2015) - [j73]Kenan Kalajdzic, Samaher Hussein Ali, Ahmed Patel:
Rapid lossless compression of short text messages. Comput. Stand. Interfaces 37: 53-59 (2015) - [j72]Shahaboddin Shamshirband, Babak Daghighi, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham:
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network. J. Intell. Fuzzy Syst. 28(3): 1345-1357 (2015) - [c34]Francisco Leonardo Jales Martins, Joaquim Celestino Júnior, Antoniel da Silva Rego, Jose Henrique Brandao Neto, André L. M. dos Santos, Ahmed Patel:
MBEEC: A bio-inspired routing protocol with multihop between cluster-heads for energy saving in WSN. IWCMC 2015: 349-354 - 2014
- [j71]Ahmed Patel, Rosdiadee Nordin, Ahmed Al-Haiqi:
Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy. Comput. Stand. Interfaces 36(5): 844-854 (2014) - [j70]Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ajith Abraham:
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32: 228-241 (2014) - [j69]Qais Qassim, Ahmed Patel, Abdullah Mohd Zin:
Strategy to reduce false alarms in intrusion detection and prevention systems. Int. Arab J. Inf. Technol. 11(5): 500-506 (2014) - 2013
- [j68]Ayman Jaradat, Ahmed Patel, M. N. Zakaria, Muhamad A. H. Amina:
Accessibility algorithm based on site availability to enhance replica selection in a data grid environment. Comput. Sci. Inf. Syst. 10(1): 105-132 (2013) - [j67]Jens Myrup Pedersen, Tahir M. Riaz, Bozydar Dubalski, Damian Ledzinski, Joaquim Celestino Júnior, Ahmed Patel:
Using latency as a QoS indicator for global cloud computing services. Concurr. Comput. Pract. Exp. 25(18): 2488-2500 (2013) - [j66]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel:
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26(9): 2105-2127 (2013) - [j65]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior:
An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. 36(1): 25-41 (2013) - [c33]Alisson B. Souza, Joaquim Celestino Júnior, Felipe A. Xavier, Francisco D. Oliveira, Ahmed Patel, Maryam Latifi:
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks. ICOIN 2013: 101-106 - 2012
- [j64]Mona Taghavi, Ahmed Patel, Nikita Schmidt, Christopher Wills, Yiqi Tew:
An analysis of web proxy logs with query distribution pattern approach for search engines. Comput. Stand. Interfaces 34(1): 162-170 (2012) - [j63]Ahmed Patel, Mona Taghavi, Joaquim Celestino Júnior, Rodziah Latih, Abdullah Mohd Zin:
Safety Measures for Social Computing in Wiki Learning Environment. Int. J. Inf. Secur. Priv. 6(2): 1-15 (2012) - [j62]Azam Zavvari, Ahmed Patel:
Critical Evaluation of RFID Security Protocols. Int. J. Inf. Secur. Priv. 6(3): 56-74 (2012) - [j61]Ahmed Patel, Wei Qi, Mona Taghavi:
An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System. Inf. Manag. Comput. Secur. 20(2): 123-146 (2012) - [j60]Ehsan Golkar, Anton Satria Prabuwono, Ahmed Patel:
Real-Time Curvature Defect Detection on Outer Surfaces Using Best-Fit Polynomial Interpolation. Sensors 12(11): 14774-14791 (2012) - [c32]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior:
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing. CSS 2012: 441-458 - [c31]Antoniel da Silva Rego, Joaquim Celestino Jr., André L. M. dos Santos, Eduardo Coelho Cerqueira, Ahmed Patel, Mona Taghavi:
BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks. ICON 2012: 405-410 - 2011
- [j59]Ahmed Patel, Nikita Schmidt:
Application of structured document parsing to focused web crawling. Comput. Stand. Interfaces 33(3): 325-331 (2011) - [j58]José M. Gutiérrez López, Tahir M. Riaz, Jens Myrup Pedersen, Ahmed Patel, Ole Brun Madsen:
Analytical model based on green criteria for optical backbone network interconnection. Comput. Stand. Interfaces 33(6): 574-586 (2011) - [j57]Kenan Kalajdzic, Ahmed Patel, Mona Taghavi:
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. Int. J. Digit. Crime Forensics 3(3): 50-60 (2011) - [j56]Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan:
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card. Int. J. Inf. Secur. Priv. 5(3): 1-18 (2011) - [j55]Ahmed Patel, Wei Qi, Mona Taghavi:
Design of Secure and Trustworthy Mobile Agent-based E-marketplace System. Inf. Manag. Comput. Secur. 19(5): 333-352 (2011) - [j54]Mona Taghavi, Ahmed Patel, Hamed Taghavi:
Design of an Integrated Project Management Information System for Large Scale Public Projects: Iranian Case Study. J. Inf. Technol. Res. 4(3): 14-28 (2011) - [j53]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari:
Evaluation of Cheating Detection Methods in Academic Writings. Libr. Hi Tech 29(4): 623-640 (2011) - [c30]Jens Myrup Pedersen, Tahir M. Riaz, Joaquim Celestino Júnior, Bozydar Dubalski, Damian Ledzinski, Ahmed Patel:
Assessing Measurements of QoS for Global Cloud Computing Services. DASC 2011: 682-689 - [c29]Rodziah Latih, Ahmed Patel, Abdullah Mohd Zin, Yiqi Tew, Siti Nor Hafizah Muhammad:
Whip: A framework for mashup development with block-based development approach. ICEEI 2011: 1-6 - [c28]Siti Nor Hafizah Mohamad, Ahmed Patel, Rodziah Latih, Qais Qassim, Liu Na, Yiqi Tew:
Block-based programming approach: challenges and benefits. ICEEI 2011: 1-5 - [c27]Ahmed Patel, Kenan Kalajdzic:
Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. WDFIA 2011: 81-92 - 2010
- [j52]Ahmed Patel, Wei Qi, Christopher Wills:
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems. Inf. Manag. Comput. Secur. 18(3): 144-161 (2010) - [j51]Ahmed Patel, Qais Qassim, Christopher Wills:
A survey of intrusion detection and prevention systems. Inf. Manag. Comput. Secur. 18(4): 277-290 (2010) - [j50]Kamaruddin Malik Mohamad, Ahmed Patel, Tutut Herawan, Mustafa Mat Deris:
myKarve: JPEG Image and Thumbnail Carver. J. Digit. Forensic Pract. 3(2-4): 74-97 (2010) - [c26]Ahmed Patel, Qais Qassim, Zarina Shukor, Jose Nogueira, Joaquim Celestino Júnior, Christopher Wills:
Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System. SAISMC 2010: 223-234
2000 – 2009
- 2009
- [j49]Qi Wei, Ahmed Patel:
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols. Int. J. Mob. Comput. Multim. Commun. 1(3): 8-26 (2009) - [c25]Kenan Kalajdzic, Ahmed Patel:
A fast scheme for recovery of deleted files with evidential recording for digital forensics. WDFIA 2009: 9-19 - 2008
- [j48]Emmanouil Vlastos, Ahmed Patel:
An open source forensic tool to visualize digital evidence. Comput. Stand. Interfaces 30(1-2): 8-19 (2008) - [j47]Ahmed Patel:
Frameworks for secure, forensically safe and auditable applications. Comput. Stand. Interfaces 30(4): 213-215 (2008) - [j46]Norleyza Jailani, Noor Faezah Mohd Yatim, Yazrina Yahya, Ahmed Patel, Mazliza Othman:
Secure and auditable agent-based e-marketplace framework for mobile users. Comput. Stand. Interfaces 30(4): 237-252 (2008) - [j45]Vasilios Katos, Ahmed Patel:
A partial equilibrium view on security and privacy. Inf. Manag. Comput. Secur. 16(1): 74-83 (2008) - 2007
- [j44]Ahmed Patel, Muhammad J. Khan:
Evaluation of service management algorithms in a distributed web search system. Comput. Stand. Interfaces 29(2): 152-160 (2007) - [j43]Emmanouil Vlastos, Ahmed Patel:
An open source forensic tool to visualize digital evidence. Comput. Stand. Interfaces 29(6): 614-625 (2007) - 2006
- [j42]Jens Myrup Pedersen, Ahmed Patel, Thomas Phillip Knudsen, Ole Brun Madsen:
Applying 4-regular grid structures in large-scale access networks. Comput. Commun. 29(9): 1350-1362 (2006) - 2005
- [j41]Ahmed Patel:
Formal methods, techniques and tools for secure and reliable applications. Comput. Stand. Interfaces 27(5): 439-443 (2005) - [j40]Jimmy McGibney, Nikita Schmidt, Ahmed Patel:
A service-centric model for intrusion detection in next-generation networks. Comput. Stand. Interfaces 27(5): 513-520 (2005) - [j39]Daniel Cvrcek, Václav Matyás Jr., Ahmed Patel:
Evidence processing and privacy issues in evidence-based reputation systems. Comput. Stand. Interfaces 27(5): 533-545 (2005) - [j38]Ahmed Patel:
An automatic computing approach to developing secure, trusted and auditable services for e-business. Comput. Syst. Sci. Eng. 20(6) (2005) - [j37]Pavel Gladyshev, Ahmed Patel:
Formalising Event Time Bounding in Digital Investigations. Int. J. Digit. EVid. 4(2) (2005) - [c24]Nikita Schmidt, Ahmed Patel:
Design and Implementation of a Distributed Search and Advertising System. iiWAS 2005: 583-594 - 2004
- [j36]Pavel Gladyshev, Ahmed Patel:
Finite state machine approach to digital event reconstruction. Digit. Investig. 1(2): 130-149 (2004) - [c23]Nikita Schmidt, Ahmed Patel:
Distributed Search-Based Advertising on The Web. iiWAS 2004 - [c22]Thomas Phillip Knudsen, Ahmed Patel, Jens Myrup Pedersen, Ole Brun Madsen:
Signal Propagation Delay as a Barrier to Control Applications in WAN. PDPTA 2004: 103-107 - [c21]Jens Myrup Pedersen, Ahmed Patel, Thomas Phillip Knudsen, Ole Brun Madsen:
On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures. PDPTA 2004: 738-743 - [c20]Ahmed Patel:
Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach. TrustBus 2004: 1-10 - 2003
- [j35]Sokratis K. Katsikas, Ahmed Patel:
Special issue: securing computer communications with Public Key Infrastructure. Comput. Commun. 26(16): 1813-1814 (2003) - [j34]Ahmed Patel:
CORBA: protocols, applications, process models and standards. Comput. Stand. Interfaces 25(4): 299-301 (2003) - [j33]Mikhail Blinov, Ahmed Patel:
An application of the Reference Model for Open Distributed Processing to electronic brokerage. Comput. Stand. Interfaces 25(4): 411-425 (2003) - [j32]Nikita Schmidt, Ahmed Patel:
Rule-driven processing of tree-structured data using pointed trees. Comput. Stand. Interfaces 25(5): 463-475 (2003) - [c19]Matthias Peintner, Faheem Bukhatwa, Ahmed Patel:
Analyzing Dynamic Memory Allocation in Embedded Systems for Multi-Channel Modems. Communications in Computing 2003: 234-241 - [c18]Byurhan Hyusein, Ahmed Patel:
Web Document Indexing and Retrieval. CICLing 2003: 573-579 - [c17]Faheem Bukhatwa, Ahmed Patel:
Effects of Ordered Access Lists in Firewalls. ICWI 2003: 257-264 - [c16]Thomas Phelan, Ahmed Patel, Séamus Ó Ciardhuáin:
Simulation Based Approach to Evaluate a Distributed Search Engine. ICWI 2003: 347-354 - [c15]Byurhan Hyusein, Ahmed Patel:
Significance of HTML Tags for Document Indexing and Retrieval. ICWI 2003: 817-820 - [c14]Nikita Schmidt, Ahmed Patel, Mikhail Sogrine:
Ad Hoc Interface Evolution in Soap. ICWI 2003: 907-910 - [c13]Byurhan Hyusein, Ahmed Patel, Ferad Zyulkyarov:
Comparison of New Simple Weighting Functions for Web Documents against Existing Methods. ISCIS 2003: 236-243 - [c12]Mikhail Sogrine, Ahmed Patel:
Evaluating Database Selection Algorithms for Distributed Search. SAC 2003: 817-822 - 2002
- [j31]Ahmed Patel:
Current status and future directions of software architectures for telecommunications. Comput. Commun. 25(2): 121-132 (2002) - [j30]Ahmed Patel, Mikhail Blinov:
An External Broker Interface Based on Existing Trading Protocols. Electron. Commer. Res. 2(4): 337-358 (2002) - [i1]Nikita Schmidt, Ahmed Patel:
Using Tree Automata and Regular Expressions to Manipulate Hierarchically Structured Data. CoRR cs.CL/0201008 (2002) - 2001
- [j29]Ahmed Patel:
Access control mechanisms in digital library services. Comput. Stand. Interfaces 23(1): 19-28 (2001) - [j28]Tadhg O'Meara, Ahmed Patel:
A Topic-Specific Web Robot Model Based on Restless Bandits. IEEE Internet Comput. 5(2): 27-35 (2001) - [c11]Rinat Khoussainov, Tadhg O'Meara, Ahmed Patel:
Independent Proprietorship and Competition in Distributed Web Search. ICECCS 2001: 191-199 - 2000
- [j27]Ahmed Patel, Séamus Ó Ciardhuáin:
The impact of forensic computing on telecommunications. IEEE Commun. Mag. 38(11): 64-67 (2000) - [j26]Jenny Hands, Mikhail Bessonov, Mike Blinov, Ahmed Patel, Ron Smith:
An inclusive and extensible architecture for electronic brokerage. Decis. Support Syst. 29(4): 305-321 (2000)
1990 – 1999
- 1999
- [c10]Stelios Karanastasis, Ahmed Patel:
Security On ATM Networks. Communications and Multimedia Security 1999: 3-20 - [c9]Jenny Hands, Mikhail Bessonov, Ahmed Patel, Ron Smith:
An Inclusive and Extensible Architecture for Electronic Brokerage. HICSS 1999 - [c8]Mikhail Bessonov, Udo Heuser, Igor S. Nekrestyanov, Ahmed Patel:
Open Architecture for Distributed Search Systems. IS&N 1999: 55-69 - [c7]Igor S. Nekrestyanov, Tadhg O'Meara, Ahmed Patel, Ekaterina V. Romanova:
Building Topic-Specific Collections with Intelligent Agents. IS&N 1999: 70-82 - 1998
- [j25]Pavel Gladyshev, Ahmed Patel, Donal O'Mahony:
Cracking RC5 with Java applets. Concurr. Pract. Exp. 10(11-13): 1165-1171 (1998) - [j24]Ahmed Patel:
Managing automated electronic document delivery using the ISO interlibrary loan protocol over TCP/IP. Comput. Stand. Interfaces 19(1): 77-87 (1998) - [j23]Bharat Bhushan, Ahmed Patel:
Requirements and the concept of cooperative system management. Int. J. Netw. Manag. 8(3): 139-158 (1998) - [j22]Bharat Bhushan, Ahmed Patel:
A functional model of cooperative system management. Int. J. Netw. Manag. 8(3): 170-181 (1998) - [c6]Conn Mulvihill, Ahmed Patel, Tadhg O'Meara:
Intelligent Agent for Collaborative Diagnosis. MedInfo 1998: 232-236 - 1997
- [j21]Ahmed Patel, Kevin Gaffney:
A technique for multi-network access to multimedia messages. Comput. Commun. 20(5): 324-337 (1997) - [j20]Michael Ruplitsch, Ahmed Patel:
Performance analysis of an HDLC-based protocol with data compression. Comput. Commun. 20(7): 567-575 (1997) - [j19]Dimitrios Andreadis, Ahmed Patel:
Developing a multistack ISO-SR/Z39.50 application gateway. Comput. Stand. Interfaces 18(5): 397-415 (1997) - [j18]Ahmed Patel, Stephen Morris:
Design and Implementation of an SNMPv2 Management System for MS-DOS/Novell NetWare and Unix-TCP/IP. Int. J. Netw. Manag. 7(3): 164-174 (1997) - 1996
- [j17]Ahmed Patel, Richard Meade, Declan O'Sullivan, Mark Tierney:
Information modelling for service provisioning -- the DESSERT experience. Comput. Stand. Interfaces 18(2): 175-189 (1996) - [j16]Ahmed Patel, Niall Downey:
The need for an advanced ATM signalling protocol. Comput. Stand. Interfaces 18(3): 259-274 (1996) - [c5]Ioanna Kantzavelou, Ahmed Patel:
An attack detection system for secure computer systems - design of the ADS. SEC 1996: 337-347 - [p2]Ahmed Patel, Ioanna Kantzavelou, Ciaran Clissman, Dimitris Maroulis:
Network Security Guidelines for Health Care Management. Data Security for Health Care (1) 1996: 135-184 - [p1]Ahmed Patel, Ioanna Kantzavelou:
Issues of Security and Network Security in Health Care Information Systems. Towards Security in Medical Telematics 1996: 216-223 - 1995
- [j15]Olga Havel, Ahmed Patel:
Design and Implementation of a Composite Performance Evaluation Model for Heterogeneous Network Management Applications. Int. J. Netw. Manag. 5(1): 25-46 (1995) - [c4]Richard Meade, Ahmed Patel, Declan O'Sullivan, Mark Tierney:
A critical analysis of the DESSERT information model. Integrated Network Management 1995: 712 - 1994
- [j14]Ahmed Patel, Paul Gardiner:
A Database Handler (DBH) for broadband network administration. Comput. Commun. 17(2): 103-118 (1994) - [j13]Ahmed Patel:
Security management for OSI networks. Comput. Commun. 17(7): 544-553 (1994) - [j12]Bharat Bhushan, Ahmed Patel:
A Generic Management System for Heterogeneous Networks. Int. J. Netw. Manag. 4(3): 158-174 (1994) - 1993
- [j11]Ahmed Patel:
Information services: an overview. Comput. Commun. 16(3): 184-191 (1993) - [j10]Ahmed Patel:
Editorial. Comput. Commun. 16(9): 530-531 (1993) - [j9]Conn Mulvihill, Gabriel McDermott, Ahmed Patel:
Cooperative decision support for medical diagnosis. Comput. Commun. 16(9): 581-593 (1993) - [c3]Bharat Bhushan, Ahmed Patel, José Neuman de Souza, J.-P. Claudé:
Managing Heterogeneous Networks: Integrator-Based Approach. Advanced Information Processing Techniques for LAN and MAN Management 1993: 129-144 - [c2]Niall Downey, Ahmed Patel:
High Level Generic Design of an ISDN Programming Communications Interface (PCI) for EuroISDN. Advanced Information Processing Techniques for LAN and MAN Management 1993: 145-158 - 1991
- [j8]Ahmed Patel, Gabriel McDermott, Conn Mulvihill:
Focused interfaces for end-user network management. Comput. Commun. 14(8): 469-477 (1991) - 1990
- [j7]Ahmed Patel, Vincent Ryan:
Introduction to names, addresses and routes in an OSI environment. Comput. Commun. 13(1): 27-36 (1990) - [j6]Ahmed Patel:
The principles of computer networking: D Russell Cambridge University Press, UK (1989), ISBN 0-521-33992-8, 513 pp. Comput. Commun. 13(3): 175 (1990) - [j5]Ahmed Patel:
Network management issues in support of X.32 services. Comput. Commun. 13(6): 347-353 (1990)
1980 – 1989
- 1988
- [j4]Ahmed Patel, Vincent Ryan:
Electronic directory services. Comput. Commun. 11(5): 239-244 (1988) - 1986
- [j3]Ahmed Patel, Michael Purser:
The Design of a Small Packet-Switching Node. Comput. Networks 11: 287-295 (1986) - [j2]Ahmed Patel:
Communication network protocols. Comput. Commun. 9(6): 317 (1986) - [c1]Thore Danielsen, Uta Pankoke-Babatz, Wolfgang Prinz, Ahmed Patel, Paul-André Pays, Knut Smaaland, Rolf Speth:
The AMIGO Project: advanced group communication model for computer-based communications environment. CSCW 1986: 115-142 - 1980
- [j1]Ahmed Patel, Michael Purser:
Systems Programming for Data Communications on Minicomputers. Softw. Pract. Exp. 10(4): 283-305 (1980)
Coauthor Index
aka: Joaquim Celestino Júnior
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint