A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems

M Imran, HUR Siddiqui, A Raza, MA Raza… - Computers & …, 2023 - Elsevier
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …

[HTML][HTML] A novel ensemble method for enhancing Internet of Things device security against botnet attacks

A Arshad, M Jabeen, S Ubaid, A Raza… - Decision Analytics …, 2023 - Elsevier
The growing number of connected Internet of Things (IoT) devices has led to the daily
growth of network botnet attacks. The networks of compromised devices controlled by a …

Novel class probability features for optimizing network attack detection with machine learning

A Raza, K Munir, MS Almutairi, R Sehar - IEEE Access, 2023 - ieeexplore.ieee.org
Network attacks refer to malicious activities exploiting computer network vulnerabilities to
compromise security, disrupt operations, or gain unauthorized access to sensitive …

Enabling a secure iot environment using a blockchain-based local-global consensus manager

S Alghamdi, A Albeshri, A Alhusayni - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) refers to the network of interconnected devices that can
communicate and share data over the Internet. The widespread adoption of smart devices …

AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

N Thalji, A Raza, MS Islam, NA Samee… - IEEE …, 2023 - ieeexplore.ieee.org
Structured Query Language (SQL) injection attacks represent a critical threat to database-
driven applications and systems, exploiting vulnerabilities in input fields to inject malicious …

A novel approach for real-time server-based attack detection using meta-learning

F Rustam, A Raza, M Qasim, SK Posa… - IEEE Access, 2024 - ieeexplore.ieee.org
Modern networks are crucial for seamless connectivity but face various threats, including
disruptive network attacks, which can result in significant financial and reputational risks. To …

IVNet: Transfer learning based diagnosis of breast cancer grading using histopathological images of infected cells

S Aziz, K Munir, A Raza, MS Almutairi, S Nawaz - IEEE Access, 2023 - ieeexplore.ieee.org
Breast cancer constitutes a significant global health concern that impacts millions of women
across the world. The diagnosis of breast cancer involves categorizing grades based on the …

Securing multi-environment networks using versatile synthetic data augmentation technique and machine learning algorithms

F Rustam, AD Jurcut, W Aljedaani… - 2023 20th Annual …, 2023 - ieeexplore.ieee.org
The emergence of new network architectures, protocols, and tools has made it easier for
cybercriminals to launch attacks using AI-based tools, presenting challenges in network …

[HTML][HTML] An efficient artificial intelligence approach for early detection of cross-site scripting attacks

F Younas, A Raza, N Thalji, L Abualigah, RA Zitar… - Decision Analytics …, 2024 - Elsevier
Abstract Cross-Site Scripting (XSS) attacks continue to pose a significant threat to web
applications, compromising the security and integrity of user data. XSS is a web application …

A Network Traffic Intrusion Detection Method for Industrial Control Systems Based on Deep Learning

K Jin, L Zhang, Y Zhang, D Sun, X Zheng - Electronics, 2023 - mdpi.com
The current mainstream intrusion detection models often have a high false negative rate,
significantly affecting intrusion detection systems'(IDSs) practicability. To address this issue …