[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review

MN Al-Mhiqani, T Alsboui, T Al-Shehari… - Computers and …, 2024 - Elsevier
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …

Intelligent buildings in smart grids: A survey on security and privacy issues related to energy management

A Llaria, J Dos Santos, G Terrasson, Z Boussaada… - Energies, 2021 - mdpi.com
During the last decade, the smart grid (SG) concept has started to become a reality, mainly
thanks to the technical progress achieved in telecommunications, informatics and power …

[PDF][PDF] An integrated imbalanced learning and deep neural network model for insider threat detection

MN Al-Mhiqani, R Ahmed, ZZ Abidin… - International Journal of …, 2021 - researchgate.net
The insider threat is a vital security problem concern in both the private and public sectors. A
lot of approaches available for detecting and mitigating insider threats. However, the …

[PDF][PDF] New insider threat detection method based on recurrent neural networks

MN Al-Mhiqani, R Ahmad, ZZ Abidin… - Indones. J. Electr. Eng …, 2020 - academia.edu
Insider threat is a significant challenge in cybersecurity. In comparison with outside
attackers, inside attackers have more privileges and legitimate access to information and …

[PDF][PDF] A framework implementation of surveillance tracking system based on PIR motion sensors

B Alathari, MF Kadhim, S Al-Khammasi… - Indonesian Journal of …, 2019 - academia.edu
A motion tracking system made from affordable hardware components is implemented to be
used inside the University of Kufa (UoK) buildings to track and detect any suspicious …

Cyber-physical systems security: analysis, opportunities, challenges, and future prospects

JB Awotunde, YJ Oguns, KA Amuda, N Nigar… - … for Cybersecurity in …, 2023 - Springer
Abstract Cyber-Physical Systems (CPS) is an emerging technology closely related to the
Internet of Things (IoT) schemes, but CPS centers on the occurrence of computation …

A new taxonomy of insider threats: an initial step in understanding authorised attack

MN Al-Mhiqani, R Ahmad, ZZ Abidin… - International …, 2018 - inderscienceonline.com
Insider threat represents one of the greatest challenges in the cyber security world. Insider
attackers have more privileged and legitimate access to the information and facilities …

Secured e-payment system based on automated authentication data and iterated salted hash algorithm

A Al Farawn, HD Rjeib, NS Ali… - … Electronics and Control …, 2020 - telkomnika.uad.ac.id
Electronic payment has been considered as one of the most significant and convenient
applications of modern electronic services e-University compared to traditional methods that …

[PDF][PDF] Clustering based affinity propagation in VANETs: Taxonomy and opportunity of research

MS Talib, A Hassan, ZA Abas… - Int. J. Recent Technol …, 2019 - academia.edu
Vehicular communication networks received good consideration and focusing on diverse
researchers in the latest years. Vehicular Adhoc Networks (VANETs) represents a …

Review of cyber attacks classifications and threats analysis in cyber-physical systems

MN Al-Mhiqani, R Ahmad, ZZ Abidin… - … Journal of Internet …, 2019 - inderscienceonline.com
Cyber-physical systems (CPSs) have been widely used in many different critical areas like
smart grid, healthcare, aircraft and etc. and they played a significant role in our daily lives …