An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems A Almalawi, X Yu, Z Tari, A Fahad, I Khalil Computers & Security 46, 94-110, 2014 | 155 | 2014 |
An efficient data-driven clustering technique to detect attacks in SCADA systems A Almalawi, A Fahad, Z Tari, A Alamri, R AlGhamdi, AY Zomaya IEEE Transactions on Information Forensics and Security 11 (5), 893-906, 2015 | 110 | 2015 |
SCADAVT-A framework for SCADA security testbed based on virtualization technology A Almalawi, Z Tari, I Khalil, A Fahad 38th Annual IEEE Conference on Local Computer Networks, 639-646, 2013 | 66 | 2013 |
An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion A Fahad, Z Tari, I Khalil, A Almalawi, AY Zomaya Future Generation Computer Systems 36, 156-169, 2014 | 65 | 2014 |
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ... Future Generation Computer Systems 115, 641-658, 2021 | 61 | 2021 |
A taxonomy of supervised learning for idss in scada environments J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ... ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020 | 54 | 2020 |
NNVWC: An Efficient-Nearest Neighbors Approach Based on Various-Widths Clustering AM Almalawi, A Fahad, Z Tari, MA Cheema, I Khalil IEEE Transactions on Knowledge and Data Engineering 28 (1), 68-81, 2015 | 48 | 2015 |
PPFSCADA: Privacy preserving framework for SCADA data publishing A Fahad, Z Tari, A Almalawi, A Goscinski, I Khalil, A Mahmood Future generation computer systems 37, 496-511, 2014 | 47 | 2014 |
Managing security of healthcare data for a modern healthcare system A Almalawi, AI Khan, F Alsolami, YB Abushark, AS Alfakeeh Sensors 23 (7), 3612, 2023 | 33 | 2023 |
An IoT based system for magnify air pollution monitoring and prognosis using hybrid artificial intelligence technique A Almalawi, F Alsolami, AI Khan, A Alkhathlan, A Fahad, K Irshad, ... Environmental Research 206, 112576, 2022 | 33 | 2022 |
Integrating blockchain technology into healthcare through an intelligent computing technique AI Khan, A ALGhamdi, FJ Alsolami, YB Abushark, A Almalawi, AM Ali, ... Computers, Materials & Continua 70 (2), 2835-2860, 2022 | 25 | 2022 |
Utilizing artificial neural network for prediction of occupants thermal comfort: A case study of a test room fitted with a thermoelectric air-conditioning system K Irshad, AI Khan, SA Irfan, MM Alam, A Almalawi, MH Zahir IEEE Access 8, 99709-99728, 2020 | 24 | 2020 |
A framework for improving the accuracy of unsupervised intrusion detection for SCADA systems A Almalawi, Z Tari, A Fahad, I Khalil 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 21 | 2013 |
An IoT-based thermoelectric air management framework for smart building applications: a case study for tropical climate K Irshad, A Almalawi, AI Khan, MM Alam, MH Zahir, A Ali Sustainability 12 (4), 1564, 2020 | 20 | 2020 |
SemTra: A semi-supervised approach to traffic flow labeling with minimal human effort A Fahad, A Almalawi, Z Tari, K Alharthi, FS Al Qahtani, M Cheriet Pattern Recognition 91, 1-12, 2019 | 18 | 2019 |
Arithmetic optimization algorithm with deep learning enabled airborne particle-bound metals size prediction model A Almalawi, AI Khan, F Alsolami, A Alkhathlan, A Fahad, K Irshad, ... Chemosphere 303, 134960, 2022 | 17 | 2022 |
Cyber security analysis and evaluation for intrusion detection systems YB Abushark, A Irshad Khan, F Alsolami, A Almalawi, M Mottahir Alam, ... Comput. Mater. Contin 72, 1765-1783, 2022 | 15 | 2022 |
Hesitant fuzzy-sets based decision-making model for security risk assessment AS Alfakeeh, A Almalawi, FJ Alsolami, YB Abushark, AI Khan, ... CMC-Comput. Mater. Contin 70, 2297-2317, 2022 | 15 | 2022 |
Experimental study of a thermoelectric air duct dehumidification system for tropical climate K Irshad, A Almalawi, K Habib, MH Zahir, A Ali, S Islam, BB Saha Heat Transfer Engineering 42 (13-14), 1159-1171, 2021 | 15 | 2021 |
Usability evaluation through fuzzy AHP-TOPSIS approach: Security requirement perspective YB Abushark, AI Khan, FJ Alsolami, A Almalawi, MM Alam, A Agrawal, ... Comput. Mater. Contin 68, 1203-1218, 2021 | 15 | 2021 |