A survey of network anomaly detection techniques M Ahmed, AN Mahmood, J Hu Journal of Network and Computer Applications 60, 19-31, 2016 | 610 | 2016 |
A survey of anomaly detection techniques in financial domain M Ahmed, AN Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 222 | 2016 |
SCADASim—A framework for building SCADA simulations C Queiroz, A Mahmood, Z Tari IEEE Transactions on Smart Grid 2 (4), 589-597, 2011 | 131 | 2011 |
Building a SCADA security testbed C Queiroz, A Mahmood, J Hu, Z Tari, X Yu 2009 Third International Conference on Network and System Security, 357-364, 2009 | 104 | 2009 |
Cyber security of smart grid infrastructure A Anwar, AN Mahmood State of the Art in Intrusion Prevention and Detection, 139-152, 2014 | 64 | 2014 |
Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid A Anwar, AN Mahmood, Z Tari Information Systems 53, 201-212, 2015 | 57 | 2015 |
A novel approach for outlier detection and clustering improvement M Ahmed, AN Mahmood Industrial Electronics and Applications (ICIEA), 2013 8th IEEE Conference on …, 2013 | 53 | 2013 |
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic AN Mahmood, J Hu, Z Tari, C Leckie Journal of Network and Computer Applications 33 (4), 491-502, 2010 | 52 | 2010 |
An efficient clustering scheme to exploit hierarchical data in network traffic analysis AN Mahmood, C Leckie, P Udaya IEEE Transactions on Knowledge and Data Engineering 20 (6), 752-767, 2008 | 52 | 2008 |
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy J Hu, I Khalil, S Han, A Mahmood Journal of Network and Computer Applications 34 (4), 1150-1159, 2011 | 48 | 2011 |
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection M Ahmed, AN Mahmood Annals of Data Science 2 (1), 111-130, 2015 | 43 | 2015 |
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements A Anwar, AN Mahmood, M Pickering Journal of Computer and System Sciences 83 (1), 58-72, 2017 | 42 | 2017 |
Network traffic analysis based on collective anomaly detection M Ahmed, AN Mahmood Industrial Electronics and Applications (ICIEA), 2014 IEEE 9th Conference on …, 2014 | 38 | 2014 |
An investigation of performance analysis of anomaly detection techniques for big data in scada systems. M Ahmed, A Anwar, AN Mahmood, Z Shah, MJ Maher EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2 (3), e5, 2015 | 37 | 2015 |
Vulnerabilities of Smart Grid State Estimation Against False Data Injection Attack A Anwar, AN Mahmood Renewable Energy Integration, 411-428, 2014 | 36 | 2014 |
Network traffic analysis and SCADA security AN Mahmood, C Leckie, J Hu, Z Tari, M Atiquzzaman Handbook of Information and Communication Security, 383-405, 2010 | 35 | 2010 |
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing E Kabir, A Mahmood, H Wang, AK Mustafa IEEE Transactions on Cloud Computing, 2015 | 33 | 2015 |
PPFSCADA: Privacy preserving framework for SCADA data publishing A Fahad, Z Tari, A Almalawi, A Goscinski, I Khalil, A Mahmood Future Generation Computer Systems 37, 496-511, 2014 | 30 | 2014 |
Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection M Ahmed, AN Mahmood International Conference on Security and Privacy in Communication Systems …, 2014 | 26 | 2014 |
Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient F Sufi, I Khalil, A Mahmood Journal of medical systems 35 (6), 1349-1358, 2011 | 25 | 2011 |