Abdulmohsen Almalawi
Cited by
Cited by
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
A Almalawi, X Yu, Z Tari, A Fahad, I Khalil
Computers & Security 46, 94-110, 2014
An efficient data-driven clustering technique to detect attacks in SCADA systems
A Almalawi, A Fahad, Z Tari, A Alamri, R AlGhamdi, AY Zomaya
IEEE Transactions on Information Forensics and Security 11 (5), 893-906, 2015
An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion
A Fahad, Z Tari, I Khalil, A Almalawi, AY Zomaya
Future Generation Computer Systems 36, 156-169, 2014
SCADAVT-A framework for SCADA security testbed based on virtualization technology
A Almalawi, Z Tari, I Khalil, A Fahad
38th Annual IEEE Conference on Local Computer Networks, 639-646, 2013
PPFSCADA: Privacy preserving framework for SCADA data publishing
A Fahad, Z Tari, A Almalawi, A Goscinski, I Khalil, A Mahmood
Future generation computer systems 37, 496-511, 2014
NNVWC: An Efficient-Nearest Neighbors Approach Based on Various-Widths Clustering
AM Almalawi, A Fahad, Z Tari, MA Cheema, I Khalil
IEEE Transactions on Knowledge and Data Engineering 28 (1), 68-81, 2015
A framework for improving the accuracy of unsupervised intrusion detection for SCADA systems
A Almalawi, Z Tari, A Fahad, I Khalil
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection
BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ...
Future Generation Computer Systems 115, 641-658, 2021
A taxonomy of supervised learning for idss in scada environments
J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ...
ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020
Semtra: a semi-supervised approach to traffic flow labeling with minimal human effort
A Fahad, A Almalawi, Z Tari, K Alharthi, FS Al Qahtani, M Cheriet
Pattern Recognition 91, 1-12, 2019
Add-on anomaly threshold technique for improving unsupervised intrusion detection on scada data
A Almalawi, A Fahad, Z Tari, AI Khan, N Alzahrani, ST Bakhsh, ...
Electronics 9 (6), 1017, 2020
Designing unsupervised intrusion detection for scada systems
AMA Almalawi
Ph. D. Dissertation. RMIT University, School of Computer Science, 2014
CluClas: Hybrid clustering-classification approach for accurate and efficient network classification
A Fahad, K Alharthi, Z Tari, A Almalawi, I Khalil
39th Annual IEEE Conference on Local Computer Networks, 168-176, 2014
Experimental study of a thermoelectric air duct dehumidification system for tropical climate
K Irshad, A Almalawi, K Habib, MH Zahir, A Ali, S Islam, BB Saha
Heat Transfer Engineering 42 (13-14), 1159-1171, 2021
Utilizing artificial neural network for prediction of occupants thermal comfort: A case study of a test room fitted with a thermoelectric air-conditioning system
K Irshad, AI Khan, SA Irfan, MM Alam, A Almalawi, MH Zahir
IEEE Access 8, 99709-99728, 2020
Impact assessment of covid-19 pandemic through machine learning models
FJ Alsolami, AS Al-Malaise Alghamdi, AI Khan, YB Abushark, A Almalawi, ...
Computers, Materials and Continua, 2895-2912, 2021
Incremental interval type-2 fuzzy clustering of data streams using single pass method
S Qaiyum, I Aziz, MH Hasan, AI Khan, A Almalawi
Sensors 20 (11), 3210, 2020
An IoT-based thermoelectric air management framework for Smart building applications: A case study for tropical climate
K Irshad, A Almalawi, AI Khan, MM Alam, M Zahir, A Ali
Sustainability 12 (4), 1564, 2020
Investigate the use of anchor-text and of query-document similarity scores to predict the performance of search engine
A Almalawi, R AlGhamdi, A Fahad
Int J Adv Comput Sci Appl 8 (11), 320-332, 2017
Supervisory Control and Data Acquisition (SCADA): An Introduction
Z Tari, I Khalil, A Almalawi, A Fahad, AY Zomaya, A Mahmood, C Queiroz
Wiley Encyclopedia of Electrical and Electronics Engineering, 1-12, 1999
The system can't perform the operation now. Try again later.
Articles 1–20