[HTML][HTML] SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues
M Alanazi, A Mahmood, MJM Chowdhury - Computers & security, 2023 - Elsevier
Supervisory control and data acquisition (SCADA) serves as the backbone of several critical
infrastructures, including water supply systems, oil pipelines, transportation and electricity. It …
infrastructures, including water supply systems, oil pipelines, transportation and electricity. It …
A survey of network anomaly detection techniques
M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
Big data analytics for user-activity analysis and user-anomaly detection in mobile wireless network
The next generation wireless networks are expected to operate in fully automated fashion to
meet the burgeoning capacity demand and to serve users with superior quality of …
meet the burgeoning capacity demand and to serve users with superior quality of …
Toward a sustainable cybersecurity ecosystem
Cybersecurity issues constitute a key concern of today's technology-based economies.
Cybersecurity has become a core need for providing a sustainable and safe society to …
Cybersecurity has become a core need for providing a sustainable and safe society to …
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
In recent times, cyberattacks on the Internet of Health Things (IoHT) have continuously been
growing, and so it is important to develop robust countermeasures. However, there is a lack …
growing, and so it is important to develop robust countermeasures. However, there is a lack …
A review of research works on supervised learning algorithms for SCADA intrusion detection and classification
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in
providing remote access, monitoring and control of critical infrastructures (CIs) which …
providing remote access, monitoring and control of critical infrastructures (CIs) which …
Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets
N Moustafa, M Ahmed, S Ahmed - 2020 IEEE 19th International …, 2020 - ieeexplore.ieee.org
With the widespread of Artificial Intelligence (AI)-enabled security applications, there is a
need for collecting heterogeneous and scalable data sources for effectively evaluating the …
need for collecting heterogeneous and scalable data sources for effectively evaluating the …
Data summarization: a survey
M Ahmed - Knowledge and Information Systems, 2019 - Springer
Summarization has been proven to be a useful and effective technique supporting data
analysis of large amounts of data. Knowledge discovery from data (KDD) is time consuming …
analysis of large amounts of data. Knowledge discovery from data (KDD) is time consuming …
[HTML][HTML] IoT data analytic algorithms on edge-cloud infrastructure: A review
The adoption of Internet of Things (IoT) sensing devices is growing rapidly due to their ability
to provide real-time services. However, it is constrained by limited data storage and …
to provide real-time services. However, it is constrained by limited data storage and …
Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very
challenging and computationally expensive task. Feature selection (FS) is an approach to …
challenging and computationally expensive task. Feature selection (FS) is an approach to …