Search Results - "AlMajali, Anas"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Adaptive Ransomware Detection Using Similarity-Preserving Hashing by AlMajali, Anas, Elmosalamy, Adham, Safwat, Omar, Abouelela, Hassan

    Published in Applied sciences (01-10-2024)
    “…Crypto-ransomware is a type of ransomware that encrypts the victim’s files and demands a ransom to return the files. This type of attack has been on the rise…”
    Get full text
    Journal Article
  2. 2

    Analyzing Cyber-Physical Threats on Robotic Platforms by Ahmad Yousef, Khalil M, AlMajali, Anas, Ghalyon, Salah Abu, Dweik, Waleed, Mohd, Bassam J

    Published in Sensors (Basel, Switzerland) (21-05-2018)
    “…Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots…”
    Get full text
    Journal Article
  3. 3

    Enhancing resilience of advanced power protection systems in smart grids against cyber–physical threats by Alasali, Feras, Hayajneh, Ali M., Ghalyon, Salah Abu, El‐Naily, Naser, AlMajali, Anas, Itradat, Awni, Holderbaume, William, Zaroure, Eyad

    Published in IET renewable power generation (01-04-2024)
    “…Abstract Recently, smart grids introduce significant challenges to power system protection due to the high integration with distributed energy resources (DERs)…”
    Get full text
    Journal Article
  4. 4

    IGNORE: A Policy Server to Prevent Cyber-Attacks from Propagating to the Physical Domain by Wadhawan, Yatin, Neuman, Clifford, AlMajali, Anas

    Published in Applied sciences (01-09-2020)
    “…We present the intelligent governor for the smart grid system (IGNORE) to limit the success of attacks when a grid’s cyber system has been compromised and…”
    Get full text
    Journal Article
  5. 5

    Smart Grid Resilience for Grid-Connected PV and Protection Systems under Cyber Threats by Alasali, Feras, Itradat, Awni, Abu Ghalyon, Salah, Abudayyeh, Mohammad, El-Naily, Naser, Hayajneh, Ali M., AlMajali, Anas

    Published in Smart cities (Basel) (01-12-2023)
    “…In recent years, the integration of Distributed Energy Resources (DERs) and communication networks has presented significant challenges to power system control…”
    Get full text
    Journal Article
  6. 6

    Automated Vulnerability Exploitation Using Deep Reinforcement Learning by AlMajali, Anas, Al-Abed, Loiy, Ahmad Yousef, Khalil M., Mohd, Bassam J., Samamah, Zaid, Abu Shhadeh, Anas

    Published in Applied sciences (01-10-2024)
    “…The main objective of this paper is to develop a reinforcement agent capable of effectively exploiting a specific vulnerability. Automating pentesting can…”
    Get full text
    Journal Article
  7. 7

    Semi-quantitative security risk assessment of robotic systems by Duwayk, Walid, al-Majali, Anas, Yusuf, Khalil M. Ahmad, Mohd, Bassam J., Abu Ghalyun, Salah, Hasan, Roa’a

    “…Robots are becoming increasingly integrated in our daily lives, providing services in civilian, industrial and military applications. many of those…”
    Get full text
    Journal Article
  8. 8

    A hybrid physical and co-simulation modern adaptive power protection testbed for testing the resilience of smart grids under cyber-physical threats by Alasali, Feras, El-Naily, Naser, Holderbaum, William, Mustafa, Haytham Y., AlMajali, Anas, Itradat, Awni

    Published in Energy reports (01-12-2024)
    “…Power protection systems play a critical role in ensuring the safe and reliable operation of modern power grids. With the increasing complexity of grid…”
    Get full text
    Journal Article
  9. 9

    Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study by Ahmad Yousef, Khalil M., Mohd, Bassam J., Barham, Omar, Al-Najjar, Ahmad, Abu-Diab, Mohammad, AlMajali, Anas

    Published in Intelligent service robotics (01-07-2024)
    “…The use of robots as personal assistants has gained significant interest in recent years. In this research, our motivation is to employ a robot as a personal…”
    Get full text
    Journal Article
  10. 10

    Crypto-Ransomware Detection Using Selective Hashing by AlMajali, Anas, Qaffaf, Ahmad, Alkayid, Natali, Wadhawan, Yatin

    “…Ransomware is a malicious software that attempts to encrypt the user's files and demand a ransom in exchange for decrypting the files. This malware may have…”
    Get full text
    Conference Proceeding
  11. 11

    Enhancing Cyber-Physical Threat Assessment in Power Distribution Networks by Alasali, Feras, AlMajali, Anas, Abudayyeh, Mohammad, Aldeiri, Bashar, El-Naily, Naser, Zarour, Eyad

    “…The existing literature on cyber-physical threat investigations predominantly concentrates on the high voltage (HV) level, disregarding the higher probability…”
    Get full text
    Conference Proceeding
  12. 12

    Modeling worm propagation in the advanced metering infrastructure by AlMajali, Anas, Dweik, Waleed

    “…A computer worm is malicious software that can spread rapidly between interconnected devices and perform malicious actions. In an Advanced Metering…”
    Get full text
    Conference Proceeding
  13. 13

    Analyzing cyber-physical attacks on smart grid systems by Wadhawan, Yatin, Neuman, Clifford, AlMajali, Anas

    “…We present a roadmap to evaluate the resilience of Smart Grid systems in the presence of cyber-physical attacks on its various functions and components such as…”
    Get full text
    Conference Proceeding
  14. 14

    Vulnerability Exploitation Using Reinforcement Learning by AlMajali, Anas, Al-Abed, Loiy, Mutleq, Ruba, Samamah, Zaid, Shhadeh, Anas Abu, Mohd, Bassam J., Ahmad Yousef, Khalil M.

    “…Our main goal is to create a reinforcement agent that is capable of exploiting a particular vulnerability. Hiring a penetration tester or doing manual…”
    Get full text
    Conference Proceeding
  15. 15

    Power-Aware Adaptive Encryption by Mohd, Bassam Jamil, Yousef, Khalil M. Ahmad, AlMajali, Anas, Hayajneh, Thaier

    “…Recently, there has been a significant increase in number of resource-constrained devices, which are typically battery-powered. Encryption schemes are employed…”
    Get full text
    Conference Proceeding
  16. 16

    Modeling security policies for mitigating the risk of load altering attacks on smart grid systems by Ryutov, Tatyana, Almajali, Anas, Neuman, Clifford

    “…While demand response programs achieve energy efficiency and quality objectives, they bring potential security threats into the Smart Grid. An ability to…”
    Get full text
    Conference Proceeding
  17. 17

    Security risk assessment of the PeopleBot mobile robot research platform by Ahmad Yousef, Khalil M., AlMajali, Anas, Hasan, Roa'a, Dweik, Waleed, Mohd, Bassam

    “…Nowadays, robots are widely ubiquitous and integral part in our daily lives, which can be seen almost everywhere in industry, hospitals, military, etc. To…”
    Get full text
    Conference Proceeding
  18. 18

    A systems approach to analysing cyber-physical threats in the Smart Grid by AlMajali, Anas, Rice, Eric, Viswanathan, Arun, Tan, Kymie, Neuman, Clifford

    “…This paper presents a systems analysis approach to characterizing the risk of a Smart Grid to a load-drop attack. A characterization of the risk is necessary…”
    Get full text
    Conference Proceeding