How do Gender and Age Similarities with a Potential Social Engineer Influence One's Trust and Willingness to Take Security Risks? I Abuelezz, M Barhmagi, S Al-Shakhsi, A Yankouskaya, A Nhlabatsi, ... | | 2024 |
Do Cialdini’s Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible? A Mollazehi, I Abuelezz, M Barhamgi, KM Khan, R Ali International Conference on Research Challenges in Information Science, 273-288, 2024 | | 2024 |
A machine learning-based optimization approach for pre-copy live virtual machine migration RM Haris, KM Khan, A Nhlabatsi, M Barhamgi Cluster Computing 27 (2), 1293-1312, 2024 | 4 | 2024 |
When Deciding to Trust a Potential Social Engineer, does their Age, Gender, Ethnic Similarity, and Appearance Formality Matter? I Abuelezz, M Barhamgi, A Nhlabatsi, KM Khan, R Ali Gender, Ethnic Similarity, and Appearance Formality Matter, 2024 | | 2024 |
Interactive Graphical Access Control Tools R Fernandez, P Cheng, B Smith, T Fenton, Y Boraey, A Nhlabatsi, K Khan, ... 2023 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2023 | | 2023 |
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems M Elnour, M Noorizadeh, M Shakerpour, N Meskin, K Khan, R Jain IEEE Access, 2023 | 5 | 2023 |
Quantifying satisfaction of security features of cloud software systems A Nhlabatsi, K Khan, J Hong, DS Kim, R Fernandez, N Fetais US Patent App. 17/993,073, 2023 | | 2023 |
Effective collaboration in the management of access control policies: A survey of tools R Fernandez, PCH Cheng, A Nhlabatsi, KM Khan, N Fetais IEEE Access 11, 13929-13947, 2023 | 2 | 2023 |
Live migration of virtual machine memory content in networked systems RM Haris, KM Khan, A Nhlabatsi Computer Networks 209, 108898, 2022 | 13 | 2022 |
Methods and systems for monitoring network security KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ... US Patent 11,228,616, 2022 | 13 | 2022 |
TRUST XAI: A Novel Model for Explainable AI with An Example Using IIoT Security M Zolanvari, Z Yang, K Khan, R Jain, N Meskin IEEE Internet of Things Journal, 2021 | 1 | 2021 |
Trust xai: Model-agnostic explanations for ai with a case study on iiot security M Zolanvari, Z Yang, K Khan, R Jain, N Meskin IEEE internet of things journal 10 (4), 2967-2978, 2021 | 68 | 2021 |
Threat-specific security risk evaluation for networked systems A Nhlabatsi, J Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ... US Patent 11,146,583, 2021 | 19 | 2021 |
Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach MA Teixeira, M Zolanvari, KM Khan, R Jain, N Meskin IET Cyber‐Physical Systems: Theory & Applications 6 (3), 178-191, 2021 | 12 | 2021 |
Understanding the impact of emotions on the quality of software artifacts KM Khan, M Saleh IEEE Access 9, 110194-110208, 2021 | 4 | 2021 |
HVAC system attack detection dataset M Elnour, N Meskin, K Khan, R Jain Data in Brief 37, 107166, 2021 | 8 | 2021 |
Quantifying satisfaction of security requirements of cloud software systems AM Nhlabatsi, KM Khan, JB Hong, DSD Kim, R Fernandez, N Fetais IEEE Transactions on Cloud Computing, 2021 | 7 | 2021 |
Application of data-driven attack detection framework for secure operation in smart buildings M Elnour, N Meskin, K Khan, R Jain Sustainable Cities and Society 69, 102816, 2021 | 45 | 2021 |
Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics MK Alkaeed, Z Alamro, MS Al-Ali, HA Al-Mohammed, KM Khan 2020 IEEE 10th International Conference on System Engineering and Technology …, 2020 | 7 | 2020 |
Distributed framework via block-chain smart contracts for smart grid systems against cyber-attacks M Alkaeed, MM Soliman, KM Khan, TM Elfouly 2020 11th IEEE Control and System Graduate Research Colloquium (ICSGRC), 100-105, 2020 | 5 | 2020 |