• A dual-isolation-forests-based attack detection framework for industrial control systems 

      Elnour, M.; Meskin, Nader; Khan, K.; Jain, R. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      The cybersecurity of industrial control systems (ICSs) is becoming increasingly critical under the current advancement in the cyber activity and the Internet of Things (IoT) technologies, and their direct impact on several ...
    • Application of data-driven attack detection framework for secure operation in smart buildings 

      Elnour, M.; Meskin, Nader; Khan, K.; Jain, R. ( Elsevier Ltd , 2021 , Article)
      With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the ...
    • Cybersecurity for industrial control systems: A survey 

      Bhamare, D.; Zolanvari, M.; Erbad, A.; Jain, R.; Khan, K.; ... more authors ( Elsevier Ltd , 2020 , Article Review)
      Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic ...
    • Enhancement of mechanical and corrosion resistance properties of electrodeposited NiP-TiC composite coatings 

      Fayyaz O.; Khan A.; Shakoor R.A.; Hasan, Anwarul; Yusuf M.M.; ... more authors ( Nature Research , 2021 , Article)
      In the present study, the effect of concentration of titanium carbide (TiC) particles on the structural, mechanical, and electrochemical properties of Ni–P composite coatings was investigated. Various amounts of TiC particles ...
    • HVAC system attack detection dataset 

      Elnour, M.; Meskin, Nader; Khan, K.; Jain, R. ( Elsevier Inc. , 2021 , Dataset)
      The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for ...
    • Security-aware service composition for end users of small enterprises 

      Khan, K.; Malluhi, Q. ( IOS Press , 2010 , Article)
      This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...
    • TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security 

      Zolanvari, M.; Yang, Z.; Khan, K.; Jain, R.; Meskin, Nader ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Despite AI’s significant growth, its “black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical ...
    • Using Sparse Matrices to Prevent Information Leakage in Cloud Computing 

      Khan K.; Shaheen M.; Wang Y. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ...