Search Results - 36613541700
- Showing 1 - 20 results of 23
- Go to Next Page
-
1
Information Overload: The Effects of Large Amounts of Information by Mahdi M.N., Ahmad A.R., Ismail R., Subhi M.A., Abdulrazzaq M.M., Qassim Q.S.
Published 2023Conference Paper -
2
A review: Towards practical attack taxonomy for industrial control systems by Qassim Q.S., Jamil N., Jidin R., Rusli M.E., Ahmad Zawawi M.N., Jamaludin M.Z., Z'aba M.R., Kamarulzaman W.A.W.
Published 2023Other Authors: “…36613541700…”
Article -
3
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system by Qassim Q.S., Jamil N., Daud M., Ja'affar N., Yussof S., Ismail R., Kamarulzaman W.A.W.
Published 2023Other Authors: “…36613541700…”
Article -
4
-
5
Improving the usability of faceted exploratory search tools by Mahdi M.N., Ahmad A.R., Qassim Q.S., Ismail R.
Published 2023Article -
6
A Study on security vulnerabilities assessment and quantification in SCADA systems by Firdaus Z., Jamil N., Qassim Q.S., Rusli M.E., Ja'affar N., Daud M., Hasan H.
Published 2023Article -
7
Comprehensive review and future research directions on dynamic faceted search by Mahdi M.N., Ahmad A.R., Natiq H., Subhi M.A., Qassim Q.S.
Published 2023Article -
8
Towards implementing scalable and reconfigurable SCADA security testbed in power system environment by Saif Qassim Q., Jamil N., Daud M., Che Hasan H.
Published 2023Other Authors: “…36613541700…”
Article -
9
Use of Faceted Search: The Effect on Researchers by Mahdi M.N., Ahmad A.R., Qassim Q.S., Subhi M.A.
Published 2023Conference Paper -
10
A Survey on the Use of Personalized Model-Based Search Engine by Mahdi M.N., Ahmad A.R., Qassim Q.S., Subhi M.A., Bakare T.A.
Published 2023Conference Paper -
11
Visualization in Faceted Search Engine - A Review by Mahdi M.N., Ahmad A.R., Subhi M.A., Ismail R., Qassim Q.S.
Published 2023Conference Paper -
12
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system by Qassim Q.S., Jamil N., Z'aba M.R., Kamarulzaman W.A.W.
Published 2023Other Authors: “…36613541700…”
Article -
13
From 5g to 6g technology: Meets energy, internet-of-things and machine learning: A survey by Mahdi M.N., Ahmad A.R., Qassim Q.S., Natiq H., Subhi M.A., Mahmoud M.
Published 2023Article -
14
Threat Assessment Model in Electrical Power Grid Environment by Qassim Q.S., Jamil N., Mahdi M.N., Rahim F.A., Cob Z.C., Sidek L.M.
Published 2023Other Authors: “…36613541700…”
Conference Paper -
15
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems by Qassim Q.S., Jamil N., Mahdi M.N., Cob Z.C., Rahim F.A., Sidek L.M.
Published 2023Other Authors: “…36613541700…”
Conference Paper -
16
Symptoms-Based Network Intrusion Detection System by Qassim Q.S., Jamil N., Mahdi M.N.
Published 2023Other Authors: “…36613541700…”
Conference Paper -
17
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway by Qassim Q.S., Jamil N., Mahdi M.N., Ahmad Zawawi M.N., Jamaludin M.Z., Jidin R., Rusli M.E.
Published 2023Other Authors: “…36613541700…”
Conference Paper -
18
A practical SCADA testbed in electrical power system environment for cyber-security exercises by Jamil N., Qassim Q., Daud M., Abidin I.Z., Jaaffar N., Kamarulzaman W.A.W.
Published 2023Conference Paper -
19
An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems by Qassim Q., Ahmad A.R., Ismail R., Abu Bakar A., Abdul Rahim F., Mokhtar M.Z., Ramli R., Mohd Yusof B., Mahdi M.N.
Published 2023Other Authors: “…36613541700…”
Conference Paper -
20
Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data by Jidin R., Tukijan S.N., Al-Bahadly I., Jamil N., Qassim Q.S.
Published 2023Conference Paper
