A survey of network anomaly detection techniques M Ahmed, AN Mahmood, J Hu Journal of Network and Computer Applications 60, 19-31, 2016 | 982 | 2016 |
A survey of anomaly detection techniques in financial domain M Ahmed, AN Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 328 | 2016 |
SCADASim—A framework for building SCADA simulations C Queiroz, A Mahmood, Z Tari IEEE Transactions on Smart Grid 2 (4), 589-597, 2011 | 162 | 2011 |
Building a SCADA security testbed C Queiroz, A Mahmood, J Hu, Z Tari, X Yu 2009 Third International Conference on Network and System Security, 357-364, 2009 | 115 | 2009 |
Cyber security of smart grid infrastructure A Anwar, AN Mahmood State of the Art in Intrusion Prevention and Detection, 139-152, 2014 | 91* | 2014 |
TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems A Alsaedi, N Moustafa, Z Tari, A Mahmood, A Anwar IEEE Access 8, 165130-165150, 2020 | 87 | 2020 |
Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid A Anwar, AN Mahmood, Z Tari Information Systems 53, 201-212, 2015 | 74 | 2015 |
A novel approach for outlier detection and clustering improvement M Ahmed, AN Mahmood Industrial Electronics and Applications (ICIEA), 2013 8th IEEE Conference on …, 2013 | 73 | 2013 |
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements A Anwar, AN Mahmood, M Pickering Journal of Computer and System Sciences 83 (1), 58-72, 2017 | 68 | 2017 |
Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection M Ahmed, AN Mahmood Annals of Data Science 2 (1), 111-130, 2015 | 64 | 2015 |
An efficient clustering scheme to exploit hierarchical data in network traffic analysis AN Mahmood, C Leckie, P Udaya IEEE Transactions on Knowledge and Data Engineering 20 (6), 752-767, 2008 | 57 | 2008 |
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic AN Mahmood, J Hu, Z Tari, C Leckie Journal of Network and Computer Applications 33 (4), 491-502, 2010 | 54 | 2010 |
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure S Desai, R Alhadad, N Chilamkurti, AN Mahmood Cluster Computing, 1-27, 2018 | 52 | 2018 |
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy J Hu, I Khalil, S Han, A Mahmood Journal of Network and Computer Applications 34 (4), 1150-1159, 2011 | 50 | 2011 |
Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication A Diro, H Reda, N Chilamkurti, A Mahmood, N Zaman, Y Nam IEEE Access 8, 60539-60551, 2020 | 48 | 2020 |
An investigation of performance analysis of anomaly detection techniques for big data in scada systems. M Ahmed, A Anwar, AN Mahmood, Z Shah, MJ Maher EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2 (3), e5, 2015 | 47 | 2015 |
Network traffic analysis based on collective anomaly detection M Ahmed, AN Mahmood 2014 9th IEEE Conference on Industrial Electronics and Applications, 1141-1146, 2014 | 45 | 2014 |
Vulnerabilities of Smart Grid State Estimation Against False Data Injection Attack A Anwar, AN Mahmood Renewable Energy Integration, 411-428, 2014 | 45 | 2014 |
Network traffic analysis and SCADA security AN Mahmood, C Leckie, J Hu, Z Tari, M Atiquzzaman Handbook of Information and Communication Security, 383-405, 2010 | 41 | 2010 |
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing ME Kabir, AN Mahmood, H Wang, AK Mustafa IEEE Transactions on Cloud Computing 8 (2), 408-417, 2015 | 39 | 2015 |