Search Results - "AlMajali, Anas"
-
1
Adaptive Ransomware Detection Using Similarity-Preserving Hashing
Published in Applied sciences (01-10-2024)“…Crypto-ransomware is a type of ransomware that encrypts the victim’s files and demands a ransom to return the files. This type of attack has been on the rise…”
Get full text
Journal Article -
2
Analyzing Cyber-Physical Threats on Robotic Platforms
Published in Sensors (Basel, Switzerland) (21-05-2018)“…Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots…”
Get full text
Journal Article -
3
Enhancing resilience of advanced power protection systems in smart grids against cyber–physical threats
Published in IET renewable power generation (01-04-2024)“…Abstract Recently, smart grids introduce significant challenges to power system protection due to the high integration with distributed energy resources (DERs)…”
Get full text
Journal Article -
4
IGNORE: A Policy Server to Prevent Cyber-Attacks from Propagating to the Physical Domain
Published in Applied sciences (01-09-2020)“…We present the intelligent governor for the smart grid system (IGNORE) to limit the success of attacks when a grid’s cyber system has been compromised and…”
Get full text
Journal Article -
5
Smart Grid Resilience for Grid-Connected PV and Protection Systems under Cyber Threats
Published in Smart cities (Basel) (01-12-2023)“…In recent years, the integration of Distributed Energy Resources (DERs) and communication networks has presented significant challenges to power system control…”
Get full text
Journal Article -
6
Automated Vulnerability Exploitation Using Deep Reinforcement Learning
Published in Applied sciences (01-10-2024)“…The main objective of this paper is to develop a reinforcement agent capable of effectively exploiting a specific vulnerability. Automating pentesting can…”
Get full text
Journal Article -
7
Semi-quantitative security risk assessment of robotic systems
Published in Jordanian journal of computers and information technology (Online) (01-12-2018)“…Robots are becoming increasingly integrated in our daily lives, providing services in civilian, industrial and military applications. many of those…”
Get full text
Journal Article -
8
A hybrid physical and co-simulation modern adaptive power protection testbed for testing the resilience of smart grids under cyber-physical threats
Published in Energy reports (01-12-2024)“…Power protection systems play a critical role in ensuring the safe and reliable operation of modern power grids. With the increasing complexity of grid…”
Get full text
Journal Article -
9
Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study
Published in Intelligent service robotics (01-07-2024)“…The use of robots as personal assistants has gained significant interest in recent years. In this research, our motivation is to employ a robot as a personal…”
Get full text
Journal Article -
10
Crypto-Ransomware Detection Using Selective Hashing
Published in 2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA) (23-11-2022)“…Ransomware is a malicious software that attempts to encrypt the user's files and demand a ransom in exchange for decrypting the files. This malware may have…”
Get full text
Conference Proceeding -
11
Enhancing Cyber-Physical Threat Assessment in Power Distribution Networks
Published in 2023 11th International Conference on ENERGY and ENVIRONMENT (CIEM) (26-10-2023)“…The existing literature on cyber-physical threat investigations predominantly concentrates on the high voltage (HV) level, disregarding the higher probability…”
Get full text
Conference Proceeding -
12
Modeling worm propagation in the advanced metering infrastructure
Published in 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA) (01-12-2016)“…A computer worm is malicious software that can spread rapidly between interconnected devices and perform malicious actions. In an Advanced Metering…”
Get full text
Conference Proceeding -
13
Analyzing cyber-physical attacks on smart grid systems
Published in 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES) (01-04-2017)“…We present a roadmap to evaluate the resilience of Smart Grid systems in the presence of cyber-physical attacks on its various functions and components such as…”
Get full text
Conference Proceeding -
14
Vulnerability Exploitation Using Reinforcement Learning
Published in 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (22-05-2023)“…Our main goal is to create a reinforcement agent that is capable of exploiting a particular vulnerability. Hiring a penetration tester or doing manual…”
Get full text
Conference Proceeding -
15
Power-Aware Adaptive Encryption
Published in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (01-04-2019)“…Recently, there has been a significant increase in number of resource-constrained devices, which are typically battery-powered. Encryption schemes are employed…”
Get full text
Conference Proceeding -
16
Modeling security policies for mitigating the risk of load altering attacks on smart grid systems
Published in 2015 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES) (01-04-2015)“…While demand response programs achieve energy efficiency and quality objectives, they bring potential security threats into the Smart Grid. An ability to…”
Get full text
Conference Proceeding -
17
Security risk assessment of the PeopleBot mobile robot research platform
Published in 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA) (01-11-2017)“…Nowadays, robots are widely ubiquitous and integral part in our daily lives, which can be seen almost everywhere in industry, hospitals, military, etc. To…”
Get full text
Conference Proceeding -
18
A systems approach to analysing cyber-physical threats in the Smart Grid
Published in 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm) (01-10-2013)“…This paper presents a systems analysis approach to characterizing the risk of a Smart Grid to a load-drop attack. A characterization of the risk is necessary…”
Get full text
Conference Proceeding