Vulnerability assessment of cyber security for SCADA systems K Coffey, LA Maglaras, R Smith, H Janicke, MA Ferrag, A Derhab, ... Guide to Vulnerability Analysis for Computer Networks and Systems: An …, 2018 | 27 | 2018 |
Effect of jamming technique on the performance of Direct Sequence Spread Spectrum Modem A Yousaf, A Loan 13th International Conference on Advanced Communication Technology …, 2011 | 18 | 2011 |
Physical‐layer intrusion detection system for smart jamming attacks A Yousaf, A Loan, RF Babiceanu, O Yousaf Transactions on Emerging Telecommunications Technologies 28 (11), e3189, 2017 | 11 | 2017 |
Cyber risk assessment of cyber-enabled autonomous cargo vessel A Yousaf, A Amro, PTH Kwa, M Li, J Zhou International Journal of Critical Infrastructure Protection 46 (September …, 2024 | 7 | 2024 |
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems A Yousaf, A Loan, RF Babiceanu, L Maglaras, O Yousaf Computers & Security 70, 124-143, 2017 | 5 | 2017 |
Stochastic model based dynamic power estimation of microprocessor using Imperas simulator A Yousaf, S Masud 2016 Annual IEEE Systems Conference (SysCon), 1-8, 2016 | 5 | 2016 |
From sinking to saving: MITRE ATT&CK and D3FEND frameworks for maritime cybersecurity A Yousaf, J Zhou International Journal of Information Security 23 (3), 1603 - 1618, 2024 | 3 | 2024 |
Intruders and intrusion detection systems — An overview A Yousaf, O Yousaf 14th International Conference on Electrical Engineering/Electronics …, 2017 | 2 | 2017 |
Adaptive energy estimation and hacking of continuous phase for CPM modem jamming A Yousaf, A Loan, O Yousaf 2013 IEEE 11th Malaysia International Conference on Communications (MICC), 66-71, 2013 | 2 | 2013 |
High performance fine grained dynamic power estimation technique for multilevel caches using architectural simulator-Imperas A Yousaf, S Masud 10th International Conference on Electrical Engineering/Electronics …, 2013 | 2 | 2013 |
Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical‐layer intrusion detection system A Yousaf, A Loan, RF Babiceanu, L Maglaras, O Yousaf Transactions on Emerging Telecommunications Technologies 29 (8), e3430, 2018 | 1 | 2018 |
Asymptotic Intrusion Detection System for Stealthy Intruders A Yousaf University of Engineering & Technology, Lahore, 2018 | 1 | 2018 |
Comparison of economic models for two differently configured uninterrupted power supply systems from user electricity bill perspective A Yousaf, O Yousaf, D Yousaf 6th International Conference on Information Technology and Electrical …, 2014 | 1 | 2014 |
Guidelines for Cyber Risk Management in Autonomous Shipping M Li, A Yousaf, M Goh, J Zhou, S Chattopadhyay International Conference on Applied Cryptography and Network Security, 143-161, 2024 | | 2024 |