A survey of network anomaly detection techniques M Ahmed, AN Mahmood, J Hu Journal of Network and Computer Applications 60, 19-31, 2016 | 1763 | 2016 |
A survey of anomaly detection techniques in financial domain M Ahmed, AN Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 646 | 2016 |
TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems A Alsaedi, N Moustafa, Z Tari, A Mahmood, A Anwar IEEE Access 8, 165130-165150, 2020 | 545 | 2020 |
SCADASim—A framework for building SCADA simulations C Queiroz, A Mahmood, Z Tari IEEE Transactions on Smart Grid 2 (4), 589-597, 2011 | 210 | 2011 |
An architecture and performance evaluation of blockchain-based peer-to-peer energy trading J Abdella, Z Tari, A Anwar, A Mahmood, F Han IEEE Transactions on Smart Grid 12 (4), 3364-3378, 2021 | 140 | 2021 |
Building a SCADA security testbed C Queiroz, A Mahmood, J Hu, Z Tari, X Yu 2009 Third International Conference on Network and System Security, 357-364, 2009 | 132 | 2009 |
Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication A Diro, H Reda, N Chilamkurti, A Mahmood, N Zaman, Y Nam IEEE Access 8, 60539-60551, 2020 | 124 | 2020 |
Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts HT Reda, A Anwar, A Mahmood Renewable and Sustainable Energy Reviews 163, 112423, 2022 | 114 | 2022 |
Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid A Anwar, AN Mahmood, Z Tari Information Systems 53, 201-212, 2015 | 114 | 2015 |
Cyber security of smart grid infrastructure A Anwar, AN Mahmood State of the Art in Intrusion Prevention and Detection, 139-152, 2014 | 111 | 2014 |
A novel approach for outlier detection and clustering improvement M Ahmed, AN Mahmood Industrial Electronics and Applications (ICIEA), 2013 8th IEEE Conference on …, 2013 | 102 | 2013 |
SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues M Alanazi, A Mahmood, MJM Chowdhury Computers & security 125, 103028, 2023 | 94 | 2023 |
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection M Ahmed, AN Mahmood Annals of Data Science 2 (1), 111-130, 2015 | 91 | 2015 |
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure S Desai, R Alhadad, N Chilamkurti, AN Mahmood Cluster Computing, 1-27, 2018 | 89 | 2018 |
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements A Anwar, AN Mahmood, M Pickering Journal of Computer and System Sciences 83 (1), 58-72, 2017 | 88 | 2017 |
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing ME Kabir, AN Mahmood, H Wang, AK Mustafa IEEE Transactions on Cloud Computing 8 (2), 408-417, 2015 | 75 | 2015 |
A Taxonomy of Supervised Learning for IDSs in SCADA Environments J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ... ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020 | 64 | 2020 |
An investigation of performance analysis of anomaly detection techniques for big data in scada systems. M Ahmed, A Anwar, AN Mahmood, Z Shah, MJ Maher EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2 (3), e5, 2015 | 63 | 2015 |
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges P Maniriho, AN Mahmood, MJM Chowdhury Future Generation Computer Systems 130, 1-18, 2022 | 62 | 2022 |
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic AN Mahmood, J Hu, Z Tari, C Leckie Journal of Network and Computer Applications 33 (4), 491-502, 2010 | 62 | 2010 |