• Cooperative information security/cybersecurity curriculum development 

      Bouras, Abdelaziz; Gasmi, Houssem; Ghemri, Fadi ( Springer Verlag , 2018 , Conference Paper)
      It is often difficult to meaningfully convey concepts like security incident management cycle, information sharing, cooperation, as well as the roles of people, processes and technology in information and cybersecurity ...
    • Cryptographic ransomware encryption detection: Survey 

      Kenan, Begovic; Al-Ali, Abdulaziz; Malluhi, Qutaibah ( Elsevier , 2023 , Article)
      The ransomware threat has loomed over our digital life since 1989. Criminals use this type of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts in ransom. The damage ransomware ...
    • Cybersecurity Issues in Implanted Medical Devices 

      Tabasum A.; Safi Z.; Alkhater W.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Implantable Medical Devices (IMDs) is a promising new technology in the medical field to improve the treatment of patients. IMDs are electronic devices implanted in the human body to monitor or treat various sorts of ...
    • Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management 

      Rishabh, Rajan; Rana, Nripendra P.; Parameswar, Nakul; Dhir, Sanjay; Sushil; ... more authors ( Elsevier , 2021 , Article)
      Cybersecurity is a serious issue that many organizations face these days. Therefore, cybersecurity management is very important for any organization. Organizations should learn to deal with these cyber threats through ...
    • Exploiting bluetooth vulnerabilities in e-health IoT devices 

      Zubair, Mohammed; Unal, Devrim; Al-Ali, Abdulla; Shikfa, Abdullatif ( Association for Computing Machinery , 2019 , Conference Paper)
      Internet of Things (IoT) is an interconnected network of heterogeneous things through the Internet. The current and next generation of e-health systems are dependent on IoT devices such as wireless medical sensors. One of ...
    • Exploring the synergy between nano-influencers and sports community: behavior mapping through machine learning 

      Yadav, Jitendra; Misra, Madhvendra; Rana, Nripendra P.; Singh, Kuldeep ( Emerald Publishing , 2021 , Article)
      Purpose: The paper aims to explore the influence of cybersecurity on the semantic orientation of the sports consumers. Focusing on both sport and esports, this study finds the social media factors contributing in the ...
    • Free Chain: Enabling Freedom of Expression through Public Blockchains 

      Alsarsour, Israa; Malluhi, Qutaibah; Wang, Yongge ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Everyone should have the right to expression and opinion without interference. Nevertheless, Internet censorship is often misused to block freedom of speech. The distributed ledger technology provides a globally shared ...
    • HVAC system attack detection dataset 

      Elnour, M.; Meskin, Nader; Khan, K.; Jain, R. ( Elsevier Inc. , 2021 , Dataset)
      The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for ...
    • IoT malicious traffic identification using wrapper-based feature selection mechanisms 

      Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Elsevier Ltd , 2020 , Article)
      Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
    • Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects 

      Berghout, Tarek; Benbouzid, Mohamed; Muyeen, S.M. ( Elsevier B.V. , 2022 , Article Review)
      In modern Smart Grids (SGs) ruled by advanced computing and networking technologies, condition monitoring relies on secure cyberphysical connectivity. Due to this connection, a portion of transported data, containing ...
    • SCADA system testbed for cybersecurity research using machine learning approach 

      Teixeira M.A.; Salman T.; Zolanvari M.; Jain R.; Meskin N.; ... more authors ( MDPI AG , 2018 , Article)
      This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in ...
    • The impact of stealthy attacks on smart grid performance: Tradeoffs and implications 

      Abdallah, Yara; Zheng, Zizhan; Shroff, Ness B.; El Gamal, Hesham; El-Fouly,Tarek M. ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)
      The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage ...
    • The need for a global response against cybercrime: Qatar as a case study 

      Tabassum A.; Mustafa M.S.; Maadeed S.A.A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cybersecurity is one of the most significant concerns of life in the 21st century and safeguarding information systems is an arduous task for governments and companies across the globe. The tremendous growth in wireless ...
    • Towards a Holistic Approach of Cybersecurity 

      EL Melhern, Jessica; Bouras, Abdelaziz; Ghemri, Fadi ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      This paper aims at proposing an original curriculum of sandwich training in cybersecurity in France responding to the context of the European shuffle on cybersecurity enforcement. Indeed, May of this year sets the milestone ...
    • Towards a Qatar Cybersecurity Capability Maturity Model with a Legislative Framework 

      Brown, Rafael Dean; براون, رافاييل دين ( Qatar University Press , 2019 , Article)
      In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case of Qatar prompted by a hack of the Qatar News Agency, it becomes incumbent upon states to consider legislating the ...
    • Towards electric digital twin grid: Technology and framework review 

      Sifat, Md. Mhamud Hussen; Choudhury, Safwat Mukarrama; Das, Sajal K.; Ahamed, Md. Hafiz; Muyeen, S.M.; ... more authors ( Elsevier B.V. , 2023 , Article Review)
      The major hindrances in the energy system are ecological consciousness, lack of clean and sustainable energy management, insufficient energy distribution-transmission-optimization, expensive power transfer costs, and ...
    • TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security 

      Zolanvari, M.; Yang, Z.; Khan, K.; Jain, R.; Meskin, Nader ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Despite AI’s significant growth, its “black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical ...