Follow
Abdulmohsen Almalawi
Title
Cited by
Cited by
Year
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
A Almalawi, X Yu, Z Tari, A Fahad, I Khalil
Computers & Security 46, 94-110, 2014
1552014
An efficient data-driven clustering technique to detect attacks in SCADA systems
A Almalawi, A Fahad, Z Tari, A Alamri, R AlGhamdi, AY Zomaya
IEEE Transactions on Information Forensics and Security 11 (5), 893-906, 2015
1112015
Managing security of healthcare data for a modern healthcare system
A Almalawi, AI Khan, F Alsolami, YB Abushark, AS Alfakeeh
Sensors 23 (7), 3612, 2023
692023
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection
BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ...
Future Generation Computer Systems 115, 641-658, 2021
692021
SCADAVT-A framework for SCADA security testbed based on virtualization technology
A Almalawi, Z Tari, I Khalil, A Fahad
38th Annual IEEE Conference on Local Computer Networks, 639-646, 2013
682013
An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion
A Fahad, Z Tari, I Khalil, A Almalawi, AY Zomaya
Future Generation Computer Systems 36, 156-169, 2014
652014
A taxonomy of supervised learning for idss in scada environments
J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ...
ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020
622020
PPFSCADA: Privacy preserving framework for SCADA data publishing
A Fahad, Z Tari, A Almalawi, A Goscinski, I Khalil, A Mahmood
Future generation computer systems 37, 496-511, 2014
502014
NNVWC: An Efficient-Nearest Neighbors Approach Based on Various-Widths Clustering
AM Almalawi, A Fahad, Z Tari, MA Cheema, I Khalil
IEEE Transactions on Knowledge and Data Engineering 28 (1), 68-81, 2015
482015
An IoT based system for magnify air pollution monitoring and prognosis using hybrid artificial intelligence technique
A Almalawi, F Alsolami, AI Khan, A Alkhathlan, A Fahad, K Irshad, ...
Environmental Research 206, 112576, 2022
442022
Utilizing artificial neural network for prediction of occupants thermal comfort: A case study of a test room fitted with a thermoelectric air-conditioning system
K Irshad, AI Khan, SA Irfan, MM Alam, A Almalawi, MH Zahir
IEEE Access 8, 99709-99728, 2020
292020
Integrating blockchain technology into healthcare through an intelligent computing technique
AI Khan, A ALGhamdi, FJ Alsolami, YB Abushark, A Almalawi, AM Ali, ...
Computers, Materials & Continua 70 (2), 2835-2860, 2022
282022
Cyber security analysis and evaluation for intrusion detection systems
YB Abushark, A Irshad Khan, F Alsolami, A Almalawi, M Mottahir Alam, ...
Comput. Mater. Contin 72, 1765-1783, 2022
252022
An IoT-based thermoelectric air management framework for smart building applications: a case study for tropical climate
K Irshad, A Almalawi, AI Khan, MM Alam, MH Zahir, A Ali
Sustainability 12 (4), 1564, 2020
252020
A framework for improving the accuracy of unsupervised intrusion detection for SCADA systems
A Almalawi, Z Tari, A Fahad, I Khalil
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
202013
Arithmetic optimization algorithm with deep learning enabled airborne particle-bound metals size prediction model
A Almalawi, AI Khan, F Alsolami, A Alkhathlan, A Fahad, K Irshad, ...
Chemosphere 303, 134960, 2022
192022
SemTra: A semi-supervised approach to traffic flow labeling with minimal human effort
A Fahad, A Almalawi, Z Tari, K Alharthi, FS Al Qahtani, M Cheriet
Pattern Recognition 91, 1-12, 2019
192019
Hesitant fuzzy-sets based decision-making model for security risk assessment
AS Alfakeeh, A Almalawi, FJ Alsolami, YB Abushark, AI Khan, ...
CMC-Comput. Mater. Contin 70, 2297-2317, 2022
182022
Deep Kalman neuro fuzzy-based adaptive broadcasting scheme for vehicular ad hoc network: A context-aware approach
FA Ghaleb, BAS Al-Rimy, A Almalawi, AM Ali, A Zainal, MA Rassam, ...
IEEE Access 8, 217744-217761, 2020
182020
Usability evaluation through fuzzy AHP-TOPSIS approach: Security requirement perspective
YB Abushark, AI Khan, FJ Alsolami, A Almalawi, MM Alam, A Agrawal, ...
Comput. Mater. Contin 68, 1203-1218, 2021
172021
The system can't perform the operation now. Try again later.
Articles 1–20