تصفح حسب المؤلف "n 2004088494"
-
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
Elnour, Mariam; Noorizadeh, Mohammad; Shakerpour, Mohammad; Meskin, Nader; Khan, Khaled; Jain, Raj... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to ... -
Addressing Cloud Computing in Enterprise Architecture: Issues and Challenges
Khan, Khaled; Gangavarapu, Narendra ( Cutter Consortium , 2009 , Article)This article discusses how the characteristics of cloud computing affect the enterprise architecture in four domains: business, data, application and technology. The ownership and control of architectural components are ... -
Interactive Graphical Access Control Tools
Fernandez, Rachael; Cheng, Peter; Smith, Ben; Fenton, Tania; Boraey, Yehia; Nhlabatsi, Armstrong; Khan, Khaled; Fetais, Noora... more authors ... less authors ( IEEE Computer Society , 2023 , Conference)Access control (AC) policy creation and implementation is challenging because of its complex structure and specifications. This paper explores the potential of two novel interactive graphical displays whose design draws ... -
A Threat-Specific Risk Evaluation Tool For Cloud Environments
Hussein, Alaa Sayed Ahmed (2018 , Professional Masters Project)With the spread of using cloud computing; both as organizations and individual, it has become a target for attackers. The cloud environment has several weaknesses that pose threats to its users’ assets. To assess any type ... -
ThreatBased Security Risk Evaluation in the Cloud
Nhlabatsi, Armstrong; Khan, Khaled; Fetais, Noora; Fernandez, Rachael; Hong, Jin; Seong Kim, Dong... more authors ... less authors ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic ... -
Traceability for adaptive information security in the cloud
Nhlabatsi, Armstrong; Thun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled; Nuseibeh, Bashar... more authors ... less authors ( IEEE Computer Society , 2014 , Conference)One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...





