Search Results - "Zaman, Marzia"
-
1
Distributed Ledger Technologies and Their Applications: A Review
Published in Applied sciences (01-08-2022)“…With the success of Bitcoin and the introduction of different uses of Blockchain, such as smart contracts in Ethereum, many researchers and industries have…”
Get full text
Journal Article -
2
Towards Developing a Robust Intrusion Detection Model Using Hadoop–Spark and Data Augmentation for IoT Networks
Published in Sensors (Basel, Switzerland) (01-10-2022)“…In recent years, anomaly detection and machine learning for intrusion detection systems have been used to detect anomalies on Internet of Things networks…”
Get full text
Journal Article -
3
Investigating the Avalanche effect of Various Cryptographically Secure Hash Functions and Hash-based Applications
Published in IEEE access (2022)“…In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of…”
Get full text
Journal Article -
4
Markov Prediction Model for Host Load Detection and VM Placement in Live Migration
Published in IEEE access (01-01-2018)“…The design of good host overload/underload detection and virtual machine (VM) placement algorithms plays a vital role in assuring the smoothness of VM live…”
Get full text
Journal Article -
5
A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks
Published in Symmetry (Basel) (01-08-2022)“…Supervisory Control and Data Acquisition (SCADA) systems are ubiquitous in industrial control processes, such as power grids, water supply systems, traffic…”
Get full text
Journal Article -
6
Using IOTA Tangle and Machine Learning for a Defensive Model-Based Approach Against Replication Attacks on Wireless Sensor Networks
Published in IEEE access (2024)“…Wireless Sensor Networks (WSNs) are essential for data collection across various domains but face growing risks from replication attacks, which introduce new…”
Get full text
Journal Article -
7
Validation of a Machine Learning-based IDS Design Framework using ORNL Datasets for Power System with SCADA
Published in IEEE access (01-01-2023)“…Supervisory Control and Data Acquisition (SCADA) systems are widely used for remote monitoring and control of industrial processes, such as oil and gas…”
Get full text
Journal Article -
8
Knowledge Graph Generation and Application for Unstructured Data Using Data Processing Pipeline
Published in IEEE access (2024)“…With the rapid advancement of technology and the vast volume of unstructured data available on the Internet, there is a pressing need to extract information…”
Get full text
Journal Article -
9
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
Published in Applied sciences (01-01-2021)“…The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas…”
Get full text
Journal Article -
10
Dynamic K-Means Clustering of Workload and Cloud Resource Configuration for Cloud Elastic Model
Published in IEEE access (2020)“…Cloud elasticity involves timely provisioning and de-provisioning of computing resources and adjusting resources size to meet the dynamic workload demand. This…”
Get full text
Journal Article -
11
Undergraduate Student’s Stress, Anxiety, Depression, and their Coping styles during COVID-19
Published in Mental health (Ciampino) (01-01-2023)“…: COVID-19 was responsible for widespread disturbance throughout the educational system and was harmful in a variety of ways. In particular with regard to the…”
Get full text
Journal Article -
12
Characterization and Detection of Tail Energy Bugs in Smartphones
Published in IEEE access (2018)“…Smartphones are the most ubiquitous and popular hand-held devices because of their rich set of features and wide variety of services that require frequent…”
Get full text
Journal Article -
13
Applications of clustering techniques to software partitioning, recovery and restructuring
Published in The Journal of systems and software (01-10-2004)“…The artifacts constituting a software system are sometimes unnecessarily coupled with one another or may drift over time. As a result, support of software…”
Get full text
Journal Article -
14
Characterizing Nanoparticle Size by Dynamic Light Scattering Technique (DLS)
Published 01-01-2014“…The Dynamic Light Scattering Technique was used to determine the size, shape and diffusion coefficient of nanoparticle. The intensity auto correlation…”
Get full text
Dissertation -
15
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids
Published in IEEE eTransactions on network and service management (01-03-2021)“…Smart grids rely on SCADA (Supervisory Control and Data Acquisition) systems to monitor and control complex electrical networks in order to provide reliable…”
Get full text
Journal Article -
16
Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm
Published in IEEE transactions on network science and engineering (01-07-2021)“…We propose an integrated framework for an intrusion detection system for SCADA (Supervisory Control and Data Acquisition)-based power grids. Our scheme…”
Get full text
Journal Article -
17
Multi-Phase Quantum Resistant Framework for Secure Communication in SCADA Systems
Published in IEEE transactions on dependable and secure computing (01-11-2024)“…Supervisory Control and Data Acquisition (SCADA) systems are vulnerable to traditional cyber-attacks, such as man-in-the-middle, denial of service,…”
Get full text
Journal Article -
18
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems
Published in IEEE eTransactions on network and service management (01-03-2022)“…Supervisory Control and Data Acquisition (SCADA) networks play a vital role in industrial control systems. Industrial organizations perform operations remotely…”
Get full text
Journal Article -
19
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator
Published in International journal of critical infrastructure protection (01-12-2024)“…This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems…”
Get full text
Journal Article -
20
Evaluation of machine learning techniques for network intrusion detection
Published in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (01-04-2018)“…Network traffic anomaly may indicate a possible intrusion in the network and therefore anomaly detection is important to detect and prevent the security…”
Get full text
Conference Proceeding