• Systematic identification of threats in the cloud: A Survey 

      Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors ( Elsevier B.V. , 2019 , Article)
      When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
    • Vulnerabilities and countermeasures in electrical substations 

      Hussain, Shahbaz; Hernandez Fernandez, Javier; Al-Ali, Abdulla Khalid; Shikfa, Abdullatif ( Elsevier , 2021 , Article)
      The impending and continued threat of cyberattacks on modern utility grids has called for action from the different stakeholders of the electricity sector. This calls for a thorough investigation and review of the weaknesses ...