
Ahmed Patel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j86]Tiago Portela de Souza, Maxwell E. Monteiro, Jefferson Rodrigo A. Cavalcante, Joaquim Celestino Jr., Ahmed Patel:
An extended software defined optical networks slicing architecture. Comput. Stand. Interfaces 70: 103428 (2020) - [j85]Ayman Jaradat, Hitham Alhussian, Ahmed Patel, Suliman Mohamed Fati:
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach. Comput. Stand. Interfaces 71: 103432 (2020) - [j84]Yahia Baashar, Hitham Alhussian, Ahmed Patel, Gamal Alkawsi
, Ahmed Ibrahim Alzahrani, Osama Alfarraj
, Gasim Hayder
:
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review. Comput. Stand. Interfaces 71: 103442 (2020)
2010 – 2019
- 2019
- [j83]Hitham Alhussian
, Nordin Zakaria, Ahmed Patel, Ayman Jaradat
, Said Jadid Abdulkadir
, Abdelaziz Yousif Ahmed
, Hussein T. Bahbouh, Sallam Osman Fageeri, Asim Abdallah Elsheikh, Junzo Watada:
Investigating the Schedulability of Periodic Real-Time Tasks in Virtualized Cloud Environment. IEEE Access 7: 29533-29542 (2019) - [j82]Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel, Norhamadi Ja'affar:
A review of security assessment methodologies in industrial control systems. Inf. Comput. Secur. 27(1): 47-61 (2019) - [c41]Francisco Leonardo Jales Martins, Joaquim Celestino Jr., Rafael L. Gomes, Ahmed Patel, Nazim Agoulmine:
BE-SYS: Big Data E-Health System for Analysis and Detection of Risk of Septic Shock in Adult Patients. ICC 2019: 1-6 - [c40]Omar A. Abdulkader, Alwi M. Bamhdi, Vijey Thayananthan, Kamal Jambi, Bandar Al-Ghamdi, Ahmed Patel:
A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server. ICICT (1) 2019: 375-384 - [c39]Jefferson Rodrigo A. Cavalcante, Alex F. R. Trajano, Lucas Leite, Miguel F. Mariano, Joaquim Celestino Júnior, Ahmed Patel, José Neuman de Souza
:
Securing IPv6 Wireless Networks Against Malicious Router Advertisements. PIMRC 2019: 1-6 - 2018
- [c38]Jefferson Rodrigo A. Cavalcante, Joaquim Celestino Júnior, Ahmed Patel:
Alarm Mechanism for Anticipated Detection of Network Unavailability in IP Networks Through Time Series Analysis. AINA 2018: 181-188 - [c37]Francisco R. P. da Ponte, Rafael L. Gomes, Joaquim Celestino Jr., Edmundo R. M. Madeira, Ahmed Patel:
IoT Device Programmable Language Customization for Home Automation. ISCC 2018: 168-173 - 2017
- [j81]Ahmed Patel, Hitham Alhussian, Jens Myrup Pedersen
, Bouchaib Bounabat, Joaquim Celestino Júnior, Sokratis K. Katsikas:
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Comput. Secur. 64: 92-109 (2017) - [j80]Ilane Cunha, Jefferson Rodrigo A. Cavalcante, Ahmed Patel:
A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution. Int. J. Electron. Secur. Digit. Forensics 9(3): 209-238 (2017) - [c36]Jefferson Rodrigo A. Cavalcante, Ahmed Patel, Joaquim Celestino Jr.:
Performance Management of Optical Transport Networks through Time Series Forecasting. AINA 2017: 152-159 - [c35]Tiago Portela de Souza, Jefferson Rodrigo A. Cavalcante, Ahmed Patel, Maxwell E. Monteiro, Joaquim Celestino Jr.:
SONA: Software Defined Optical Networks Slicing Architecture. AINA 2017: 654-661 - 2016
- [j79]Sarvesh Rawat
, Ahmed Patel, Joaquim Celestino Jr., André Luiz Moura dos Santos:
A dominance based rough set classification system for fault diagnosis in electrical smart grid environments. Artif. Intell. Rev. 46(3): 389-411 (2016) - [j78]Hitham Alhussian, Nordin Zakaria, Ahmed Patel:
An unfair semi-greedy real-time multiprocessor scheduling algorithm. Comput. Electr. Eng. 50: 143-165 (2016) - [j77]Ali Seyfi, Ahmed Patel:
A focused crawler combinatory link and content model based on T-Graph principles. Comput. Stand. Interfaces 43: 1-11 (2016) - [j76]Ali Seyfi, Ahmed Patel, Joaquim Celestino Júnior:
Empirical evaluation of the link and content-based focused Treasure-Crawler. Comput. Stand. Interfaces 44: 54-62 (2016) - [j75]João Gonçalves Filho, Ahmed Patel, Bruno Lopes Alcantara Batista, Joaquim Celestino Júnior:
A systematic technical survey of DTN and VDTN routing protocols. Comput. Stand. Interfaces 48: 139-159 (2016) - [i2]Ibrahim AlShourbaji, Samaher Al-Janabi, Ahmed Patel:
Document Selection in a Distributed Search Engine Architecture. CoRR abs/1603.09434 (2016) - 2015
- [j74]Ahmed Patel, Samaher Al-Janabi
, Ibrahim AlShourbaji
, Jens Myrup Pedersen
:
A novel methodology towards a trusted environment in mashup web applications. Comput. Secur. 49: 107-122 (2015) - [j73]Kenan Kalajdzic, Samaher Hussein Ali, Ahmed Patel:
Rapid lossless compression of short text messages. Comput. Stand. Interfaces 37: 53-59 (2015) - [j72]Shahaboddin Shamshirband
, Babak Daghighi, Nor Badrul Anuar
, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham:
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network. J. Intell. Fuzzy Syst. 28(3): 1345-1357 (2015) - [c34]Francisco Leonardo Jales Martins, Joaquim Celestino Júnior, Antoniel da Silva Rego, Jose Henrique Brandao Neto, André L. M. dos Santos, Ahmed Patel:
MBEEC: A bio-inspired routing protocol with multihop between cluster-heads for energy saving in WSN. IWCMC 2015: 349-354 - 2014
- [j71]Ahmed Patel, Rosdiadee Nordin
, Ahmed Al-Haiqi
:
Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy. Comput. Stand. Interfaces 36(5): 844-854 (2014) - [j70]Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar
, Miss Laiha Mat Kiah, Ajith Abraham:
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32: 228-241 (2014) - [j69]Qais Qassim, Ahmed Patel, Abdullah Mohd Zin:
Strategy to reduce false alarms in intrusion detection and prevention systems. Int. Arab J. Inf. Technol. 11(5): 500-506 (2014) - 2013
- [j68]Ayman Jaradat, Ahmed Patel, M. N. Zakaria, Muhamad A. H. Amina:
Accessibility algorithm based on site availability to enhance replica selection in a data grid environment. Comput. Sci. Inf. Syst. 10(1): 105-132 (2013) - [j67]Jens Myrup Pedersen
, Tahir M. Riaz, Bozydar Dubalski, Damian Ledzinski
, Joaquim Celestino Júnior, Ahmed Patel:
Using latency as a QoS indicator for global cloud computing services. Concurr. Comput. Pract. Exp. 25(18): 2488-2500 (2013) - [j66]Shahaboddin Shamshirband, Nor Badrul Anuar
, Miss Laiha Mat Kiah, Ahmed Patel:
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26(9): 2105-2127 (2013) - [j65]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari
, Joaquim Celestino Júnior:
An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. 36(1): 25-41 (2013) - [c33]Alisson B. Souza, Joaquim Celestino Júnior, Felipe A. Xavier, Francisco D. Oliveira, Ahmed Patel, Maryam Latifi:
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks. ICOIN 2013: 101-106 - 2012
- [j64]Mona Taghavi, Ahmed Patel, Nikita Schmidt, Christopher Wills, Yiqi Tew
:
An analysis of web proxy logs with query distribution pattern approach for search engines. Comput. Stand. Interfaces 34(1): 162-170 (2012) - [j63]Ahmed Patel, Mona Taghavi, Joaquim Celestino Júnior, Rodziah Latih, Abdullah Mohd Zin:
Safety Measures for Social Computing in Wiki Learning Environment. Int. J. Inf. Secur. Priv. 6(2): 1-15 (2012) - [j62]Azam Zavvari, Ahmed Patel:
Critical Evaluation of RFID Security Protocols. Int. J. Inf. Secur. Priv. 6(3): 56-74 (2012) - [j61]Ahmed Patel, Wei Qi, Mona Taghavi:
An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System. Inf. Manag. Comput. Secur. 20(2): 123-146 (2012) - [j60]Ehsan Golkar, Anton Satria Prabuwono
, Ahmed Patel:
Real-Time Curvature Defect Detection on Outer Surfaces Using Best-Fit Polynomial Interpolation. Sensors 12(11): 14774-14791 (2012) - [c32]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari
, Joaquim Celestino Júnior:
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing. CSS 2012: 441-458 - [c31]Antoniel da Silva Rego, Joaquim Celestino Jr., André L. M. dos Santos, Eduardo Coelho Cerqueira, Ahmed Patel, Mona Taghavi:
BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks. ICON 2012: 405-410 - 2011
- [j59]Ahmed Patel, Nikita Schmidt:
Application of structured document parsing to focused web crawling. Comput. Stand. Interfaces 33(3): 325-331 (2011) - [j58]José M. Gutiérrez López, Tahir M. Riaz, Jens Myrup Pedersen
, Ahmed Patel, Ole Brun Madsen:
Analytical model based on green criteria for optical backbone network interconnection. Comput. Stand. Interfaces 33(6): 574-586 (2011) - [j57]Kenan Kalajdzic, Ahmed Patel, Mona Taghavi:
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. Int. J. Digit. Crime Forensics 3(3): 50-60 (2011) - [j56]Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan:
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card. Int. J. Inf. Secur. Priv. 5(3): 1-18 (2011) - [j55]Ahmed Patel, Wei Qi, Mona Taghavi:
Design of Secure and Trustworthy Mobile Agent-based E-marketplace System. Inf. Manag. Comput. Secur. 19(5): 333-352 (2011) - [j54]Mona Taghavi, Ahmed Patel, Hamed Taghavi:
Design of an Integrated Project Management Information System for Large Scale Public Projects: Iranian Case Study. J. Inf. Technol. Res. 4(3): 14-28 (2011) - [j53]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari
:
Evaluation of Cheating Detection Methods in Academic Writings. Libr. Hi Tech 29(4): 623-640 (2011) - [c30]Jens Myrup Pedersen
, Tahir M. Riaz, Joaquim Celestino Júnior, Bozydar Dubalski, Damian Ledzinski
, Ahmed Patel:
Assessing Measurements of QoS for Global Cloud Computing Services. DASC 2011: 682-689 - [c29]Rodziah Latih, Ahmed Patel, Abdullah Mohd Zin, Yiqi Tew
, Siti Nor Hafizah Muhammad:
Whip: A framework for mashup development with block-based development approach. ICEEI 2011: 1-6 - [c28]Siti Nor Hafizah Mohamad, Ahmed Patel, Rodziah Latih, Qais Qassim
, Liu Na
, Yiqi Tew
:
Block-based programming approach: challenges and benefits. ICEEI 2011: 1-5 - [c27]Ahmed Patel, Kenan Kalajdzic:
Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. WDFIA 2011: 81-92 - 2010
- [j52]Ahmed Patel, Wei Qi, Christopher Wills:
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems. Inf. Manag. Comput. Secur. 18(3): 144-161 (2010) - [j51]Ahmed Patel, Qais Qassim
, Christopher Wills:
A survey of intrusion detection and prevention systems. Inf. Manag. Comput. Secur. 18(4): 277-290 (2010) - [j50]Kamaruddin Malik Mohamad, Ahmed Patel, Tutut Herawan
, Mustafa Mat Deris:
myKarve: JPEG Image and Thumbnail Carver. J. Digit. Forensic Pract. 3(2-4): 74-97 (2010) - [c26]Ahmed Patel, Qais Qassim, Zarina Shukor, Jose Nogueira, Joaquim Celestino Júnior, Christopher Wills:
Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System. SAISMC 2010: 223-234
2000 – 2009
- 2009
- [j49]Qi Wei, Ahmed Patel:
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols. Int. J. Mob. Comput. Multim. Commun. 1(3): 8-26 (2009) - [c25]Kenan Kalajdzic, Ahmed Patel:
A fast scheme for recovery of deleted files with evidential recording for digital forensics. WDFIA 2009: 9-19 - 2008
- [j48]Emmanouil Vlastos, Ahmed Patel:
An open source forensic tool to visualize digital evidence. Comput. Stand. Interfaces 30(1-2): 8-19 (2008) - [j47]Ahmed Patel:
Frameworks for secure, forensically safe and auditable applications. Comput. Stand. Interfaces 30(4): 213-215 (2008) - [j46]Norleyza Jailani, Noor Faezah Mohd Yatim, Yazrina Yahya, Ahmed Patel, Mazliza Othman
:
Secure and auditable agent-based e-marketplace framework for mobile users. Comput. Stand. Interfaces 30(4): 237-252 (2008) - [j45]Vasilios Katos
, Ahmed Patel:
A partial equilibrium view on security and privacy. Inf. Manag. Comput. Secur. 16(1): 74-83 (2008) - 2007
- [j44]Ahmed Patel, Muhammad J. Khan:
Evaluation of service management algorithms in a distributed web search system. Comput. Stand. Interfaces 29(2): 152-160 (2007) - [j43]Emmanouil Vlastos, Ahmed Patel:
An open source forensic tool to visualize digital evidence. Comput. Stand. Interfaces 29(6): 614-625 (2007) - 2006
- [j42]Jens Myrup Pedersen, Ahmed Patel, Thomas Phillip Knudsen, Ole Brun Madsen:
Applying 4-regular grid structures in large-scale access networks. Comput. Commun. 29(9): 1350-1362 (2006) - 2005
- [j41]Ahmed Patel:
Formal methods, techniques and tools for secure and reliable applications. Comput. Stand. Interfaces 27(5): 439-443 (2005) - [j40]Jimmy McGibney, Nikita Schmidt, Ahmed Patel:
A service-centric model for intrusion detection in next-generation networks. Comput. Stand. Interfaces 27(5): 513-520 (2005) - [j39]Daniel Cvrcek, Václav Matyás Jr., Ahmed Patel:
Evidence processing and privacy issues in evidence-based reputation systems. Comput. Stand. Interfaces 27(5): 533-545 (2005) - [j38]Ahmed Patel:
An automatic computing approach to developing secure, trusted and auditable services for e-business. Comput. Syst. Sci. Eng. 20(6) (2005) - [j37]Pavel Gladyshev, Ahmed Patel:
Formalising Event Time Bounding in Digital Investigations. Int. J. Digit. EVid. 4(2) (2005) - [c24]Nikita Schmidt, Ahmed Patel:
Design and Implementation of a Distributed Search and Advertising System. iiWAS 2005: 583-594 - 2004
- [j36]Pavel Gladyshev
, Ahmed Patel:
Finite state machine approach to digital event reconstruction. Digit. Investig. 1(2): 130-149 (2004) - [c23]Nikita Schmidt, Ahmed Patel:
Distributed Search-Based Advertising on The Web. iiWAS 2004 - [c22]Thomas Phillip Knudsen, Ahmed Patel, Jens Myrup Pedersen, Ole Brun Madsen:
Signal Propagation Delay as a Barrier to Control Applications in WAN. PDPTA 2004: 103-107 - [c21]Jens Myrup Pedersen, Ahmed Patel, Thomas Phillip Knudsen, Ole Brun Madsen:
On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures. PDPTA 2004: 738-743 - [c20]Ahmed Patel:
Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach. TrustBus 2004: 1-10 - 2003
- [j35]Sokratis K. Katsikas
, Ahmed Patel:
Special issue: securing computer communications with Public Key Infrastructure. Comput. Commun. 26(16): 1813-1814 (2003) - [j34]Ahmed Patel:
CORBA: protocols, applications, process models and standards. Comput. Stand. Interfaces 25(4): 299-301 (2003) - [j33]Mikhail Blinov, Ahmed Patel:
An application of the Reference Model for Open Distributed Processing to electronic brokerage. Comput. Stand. Interfaces 25(4): 411-425 (2003) - [j32]Nikita Schmidt, Ahmed Patel:
Rule-driven processing of tree-structured data using pointed trees. Comput. Stand. Interfaces 25(5): 463-475 (2003) - [c19]Matthias Peintner, Faheem Bukhatwa, Ahmed Patel:
Analyzing Dynamic Memory Allocation in Embedded Systems for Multi-Channel Modems. Communications in Computing 2003: 234-241 - [c18]Byurhan Hyusein, Ahmed Patel:
Web Document Indexing and Retrieval. CICLing 2003: 573-579 - [c17]Faheem Bukhatwa, Ahmed Patel:
Effects of Ordered Access Lists in Firewalls. ICWI 2003: 257-264 - [c16]Thomas Phelan, Ahmed Patel, Séamus Ó Ciardhuáin:
Simulation Based Approach to Evaluate a Distributed Search Engine. ICWI 2003: 347-354 - [c15]Byurhan Hyusein, Ahmed Patel:
Significance of HTML Tags for Document Indexing and Retrieval. ICWI 2003: 817-820 - [c14]Nikita Schmidt, Ahmed Patel, Mikhail Sogrine:
Ad Hoc Interface Evolution in Soap. ICWI 2003: 907-910 - [c13]Byurhan Hyusein, Ahmed Patel, Ferad Zyulkyarov
:
Comparison of New Simple Weighting Functions for Web Documents against Existing Methods. ISCIS 2003: 236-243 - [c12]Mikhail Sogrine, Ahmed Patel:
Evaluating Database Selection Algorithms for Distributed Search. SAC 2003: 817-822 - 2002
- [j31]Ahmed Patel:
Current status and future directions of software architectures for telecommunications. Comput. Commun. 25(2): 121-132 (2002) - [j30]Ahmed Patel, Mikhail Blinov:
An External Broker Interface Based on Existing Trading Protocols. Electron. Commer. Res. 2(4): 337-358 (2002) - [i1]Nikita Schmidt, Ahmed Patel:
Using Tree Automata and Regular Expressions to Manipulate Hierarchically Structured Data. CoRR cs.CL/0201008 (2002) - 2001
- [j29]Ahmed Patel:
Access control mechanisms in digital library services. Comput. Stand. Interfaces 23(1): 19-28 (2001) - [j28]Tadhg O'Meara, Ahmed Patel:
A Topic-Specific Web Robot Model Based on Restless Bandits. IEEE Internet Comput. 5(2): 27-35 (2001) - [c11]Rinat Khoussainov, Tadhg O'Meara, Ahmed Patel:
Independent Proprietorship and Competition in Distributed Web Search. ICECCS 2001: 191-199 - 2000
- [j27]Ahmed Patel, Séamus Ó Ciardhuáin:
The impact of forensic computing on telecommunications. IEEE Commun. Mag. 38(11): 64-67 (2000) - [j26]Jenny Hands, Mikhail Bessonov, Mike Blinov, Ahmed Patel, Ron Smith:
An inclusive and extensible architecture for electronic brokerage. Decis. Support Syst. 29(4): 305-321 (2000)
1990 – 1999
- 1999
- [c10]Stelios Karanastasis, Ahmed Patel:
Security On ATM Networks. Communications and Multimedia Security 1999: 3-20 - [c9]Jenny Hands, Mikhail Bessonov, Ahmed Patel, Ron Smith:
An Inclusive and Extensible Architecture for Electronic Brokerage. HICSS 1999 - [c8]Mikhail Bessonov, Udo Heuser, Igor S. Nekrestyanov, Ahmed Patel:
Open Architecture for Distributed Search Systems. IS&N 1999: 55-69 - [c7]Igor S. Nekrestyanov, Tadhg O'Meara, Ahmed Patel, Ekaterina V. Romanova:
Building Topic-Specific Collections with Intelligent Agents. IS&N 1999: 70-82 - 1998
- [j25]Pavel Gladyshev, Ahmed Patel, Donal O'Mahony:
Cracking RC5 with Java applets. Concurr. Pract. Exp. 10(11-13): 1165-1171 (1998) - [j24]Ahmed Patel:
Managing automated electronic document delivery using the ISO interlibrary loan protocol over TCP/IP. Comput. Stand. Interfaces 19(1): 77-87 (1998) - [j23]Bharat Bhushan, Ahmed Patel:
Requirements and the concept of cooperative system management. Int. J. Netw. Manag. 8(3): 139-158 (1998) - [j22]Bharat Bhushan, Ahmed Patel:
A functional model of cooperative system management. Int. J. Netw. Manag. 8(3): 170-181 (1998) - [c6]Conn Mulvihill, Ahmed Patel, Tadhg O'Meara:
Intelligent Agent for Collaborative Diagnosis. MedInfo 1998: 232-236 - 1997
- [j21]Ahmed Patel, Kevin Gaffney:
A technique for multi-network access to multimedia messages. Comput. Commun. 20(5): 324-337 (1997) - [j20]Michael Ruplitsch, Ahmed Patel:
Performance analysis of an HDLC-based protocol with data compression. Comput. Commun. 20(7): 567-575 (1997) - [j19]Dimitrios Andreadis, Ahmed Patel:
Developing a multistack ISO-SR/Z39.50 application gateway. Comput. Stand. Interfaces 18(5): 397-415 (1997) - [j18]Ahmed Patel, Stephen Morris:
Design and Implementation of an SNMPv2 Management System for MS-DOS/Novell NetWare and Unix-TCP/IP. Int. J. Netw. Manag. 7(3): 164-174 (1997) - 1996
- [j17]Ahmed Patel, Richard Meade, Declan O'Sullivan, Mark Tierney:
Information modelling for service provisioning -- the DESSERT experience. Comput. Stand. Interfaces 18(2): 175-189 (1996) - [j16]Ahmed Patel, Niall Downey:
The need for an advanced ATM signalling protocol. Comput. Stand. Interfaces 18(3): 259-274 (1996) - [c5]Ioanna Kantzavelou, Ahmed Patel:
An attack detection system for secure computer systems - design of the ADS. SEC 1996: 337-347 - [p2]Ahmed Patel, Ioanna Kantzavelou, Ciaran Clissman, Dimitris Maroulis:
Network Security Guidelines for Health Care Management. Data Security for Health Care (1) 1996: 135-184 - [p1]Ahmed Patel, Ioanna Kantzavelou:
Issues of Security and Network Security in Health Care Information Systems. Towards Security in Medical Telematics 1996: 216-223 - 1995
- [j15]Olga Havel, Ahmed Patel:
Design and Implementation of a Composite Performance Evaluation Model for Heterogeneous Network Management Applications. Int. J. Netw. Manag. 5(1): 25-46 (1995) - [c4]Richard Meade, Ahmed Patel, Declan O'Sullivan, Mark Tierney:
A critical analysis of the DESSERT information model. Integrated Network Management 1995: 712 - 1994
- [j14]Ahmed Patel, Paul Gardiner:
A Database Handler (DBH) for broadband network administration. Comput. Commun. 17(2): 103-118 (1994) - [j13]Ahmed Patel:
Security management for OSI networks. Comput. Commun. 17(7): 544-553 (1994) - [j12]Bharat Bhushan, Ahmed Patel:
A Generic Management System for Heterogeneous Networks. Int. J. Netw. Manag. 4(3): 158-174 (1994) - 1993
- [j11]Ahmed Patel:
Information services: an overview. Comput. Commun. 16(3): 184-191 (1993) - [j10]Ahmed Patel:
Editorial. Comput. Commun. 16(9): 530-531 (1993) - [j9]Conn Mulvihill, Gabriel McDermott, Ahmed Patel:
Cooperative decision support for medical diagnosis. Comput. Commun. 16(9): 581-593 (1993) - [c3]Bharat Bhushan, Ahmed Patel, José Neuman de Souza, J.-P. Claudé:
Managing Heterogeneous Networks: Integrator-Based Approach. Advanced Information Processing Techniques for LAN and MAN Management 1993: 129-144 - [c2]Niall Downey, Ahmed Patel:
High Level Generic Design of an ISDN Programming Communications Interface (PCI) for EuroISDN. Advanced Information Processing Techniques for LAN and MAN Management 1993: 145-158 - 1991
- [j8]Ahmed Patel, Gabriel McDermott, Conn Mulvihill:
Focused interfaces for end-user network management. Comput. Commun. 14(8): 469-477 (1991) - 1990
- [j7]Ahmed Patel, Vincent Ryan:
Introduction to names, addresses and routes in an OSI environment. Comput. Commun. 13(1): 27-36 (1990) - [j6]Ahmed Patel:
The principles of computer networking: D Russell Cambridge University Press, UK (1989), ISBN 0-521-33992-8, 513 pp. Comput. Commun. 13(3): 175 (1990) - [j5]