[HTML][HTML] SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues

M Alanazi, A Mahmood, MJM Chowdhury - Computers & security, 2023 - Elsevier
Supervisory control and data acquisition (SCADA) serves as the backbone of several critical
infrastructures, including water supply systems, oil pipelines, transportation and electricity. It …

A survey of network anomaly detection techniques

M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …

Big data analytics for user-activity analysis and user-anomaly detection in mobile wireless network

MS Parwez, DB Rawat… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The next generation wireless networks are expected to operate in fully automated fashion to
meet the burgeoning capacity demand and to serve users with superior quality of …

Toward a sustainable cybersecurity ecosystem

S Sadik, M Ahmed, LF Sikos, AKMN Islam - Computers, 2020 - mdpi.com
Cybersecurity issues constitute a key concern of today's technology-based economies.
Cybersecurity has become a core need for providing a sustainable and safe society to …

ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things

M Ahmed, S Byreddy, A Nutakki, LF Sikos… - Ad Hoc Networks, 2021 - Elsevier
In recent times, cyberattacks on the Internet of Health Things (IoHT) have continuously been
growing, and so it is important to develop robust countermeasures. However, there is a lack …

A review of research works on supervised learning algorithms for SCADA intrusion detection and classification

OA Alimi, K Ouahada, AM Abu-Mahfouz, S Rimer… - Sustainability, 2021 - mdpi.com
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in
providing remote access, monitoring and control of critical infrastructures (CIs) which …

Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets

N Moustafa, M Ahmed, S Ahmed - 2020 IEEE 19th International …, 2020 - ieeexplore.ieee.org
With the widespread of Artificial Intelligence (AI)-enabled security applications, there is a
need for collecting heterogeneous and scalable data sources for effectively evaluating the …

Data summarization: a survey

M Ahmed - Knowledge and Information Systems, 2019 - Springer
Summarization has been proven to be a useful and effective technique supporting data
analysis of large amounts of data. Knowledge discovery from data (KDD) is time consuming …

[HTML][HTML] IoT data analytic algorithms on edge-cloud infrastructure: A review

AE Edje, MS Abd Latiff, WH Chan - Digital Communications and Networks, 2023 - Elsevier
The adoption of Internet of Things (IoT) sensing devices is growing rapidly due to their ability
to provide real-time services. However, it is constrained by limited data storage and …

Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection

ANMB Rashid, M Ahmed, LF Sikos… - ACM Transactions on …, 2022 - dl.acm.org
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very
challenging and computationally expensive task. Feature selection (FS) is an approach to …