A survey of network anomaly detection techniques M Ahmed, AN Mahmood, J Hu Journal of Network and Computer Applications 60, 19-31, 2016 | 1686 | 2016 |
A survey of anomaly detection techniques in financial domain M Ahmed, AN Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 620 | 2016 |
TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems A Alsaedi, N Moustafa, Z Tari, A Mahmood, A Anwar IEEE Access 8, 165130-165150, 2020 | 491 | 2020 |
SCADASim—A framework for building SCADA simulations C Queiroz, A Mahmood, Z Tari IEEE Transactions on Smart Grid 2 (4), 589-597, 2011 | 206 | 2011 |
Building a SCADA security testbed C Queiroz, A Mahmood, J Hu, Z Tari, X Yu 2009 Third International Conference on Network and System Security, 357-364, 2009 | 131 | 2009 |
An architecture and performance evaluation of blockchain-based peer-to-peer energy trading J Abdella, Z Tari, A Anwar, A Mahmood, F Han IEEE Transactions on Smart Grid 12 (4), 3364-3378, 2021 | 129 | 2021 |
Cyber security of smart grid infrastructure A Anwar, AN Mahmood State of the Art in Intrusion Prevention and Detection, 139-152, 2014 | 125* | 2014 |
Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication A Diro, H Reda, N Chilamkurti, A Mahmood, N Zaman, Y Nam IEEE Access 8, 60539-60551, 2020 | 117 | 2020 |
Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid A Anwar, AN Mahmood, Z Tari Information Systems 53, 201-212, 2015 | 112 | 2015 |
Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts HT Reda, A Anwar, A Mahmood Renewable and Sustainable Energy Reviews 163, 112423, 2022 | 102 | 2022 |
A novel approach for outlier detection and clustering improvement M Ahmed, AN Mahmood Industrial Electronics and Applications (ICIEA), 2013 8th IEEE Conference on …, 2013 | 100 | 2013 |
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection M Ahmed, AN Mahmood Annals of Data Science 2 (1), 111-130, 2015 | 89 | 2015 |
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure S Desai, R Alhadad, N Chilamkurti, AN Mahmood Cluster Computing, 1-27, 2018 | 88 | 2018 |
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements A Anwar, AN Mahmood, M Pickering Journal of Computer and System Sciences 83 (1), 58-72, 2017 | 87 | 2017 |
SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues M Alanazi, A Mahmood, MJM Chowdhury Computers & security 125, 103028, 2023 | 79 | 2023 |
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing ME Kabir, AN Mahmood, H Wang, AK Mustafa IEEE Transactions on Cloud Computing 8 (2), 408-417, 2015 | 68 | 2015 |
An investigation of performance analysis of anomaly detection techniques for big data in scada systems. M Ahmed, A Anwar, AN Mahmood, Z Shah, MJ Maher EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2 (3), e5, 2015 | 62 | 2015 |
An efficient clustering scheme to exploit hierarchical data in network traffic analysis AN Mahmood, C Leckie, P Udaya IEEE Transactions on Knowledge and Data Engineering 20 (6), 752-767, 2008 | 61 | 2008 |
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic AN Mahmood, J Hu, Z Tari, C Leckie Journal of Network and Computer Applications 33 (4), 491-502, 2010 | 60 | 2010 |
A Taxonomy of Supervised Learning for IDSs in SCADA Environments J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ... ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020 | 58 | 2020 |