Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model

MM Hassan, A Gumaei, S Huda… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The trustworthiness of an industrial Internet of Things (IIoT) network is an important
stakeholder expectation. Maintaining the trustworthiness of such a network is crucial to void …

A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids

A Gumaei, MM Hassan, S Huda, MR Hassan… - Applied Soft …, 2020 - Elsevier
Smart grids are a type of complex cyber–physical system (CPS) that integrates the
communication capabilities of smart devices into the grid to facilitate remote operation and …

Evaluation feature selection with using machine learning for cyber-attack detection in smart grid

SH Mohammed, A Al-Jumaily, MJ Singh… - IEEE …, 2024 - ieeexplore.ieee.org
The Smart Grid is a modern power grid that relies on advanced technologies to provide
reliable and sustainable electricity. However, its integration with various communication …

Is 5G handover secure and private? A survey

D Zhao, Z Yan, M Wang, P Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …

[PDF][PDF] A Review on the Evaluation of Feature Selection Using Machine Learning for Cyber-Attack Detection in Smart Grid

AS JABER, YS HUSSEIN, MMAK AL-NAJJAR - 2024 - researchonline.ljmu.ac.uk
ABSTRACT The Smart Grid is a modern power grid that relies on advanced technologies to
provide reliable and sustainable electricity. However, its integration with various …

[PDF][PDF] A Comparative Analysis of Tools for Testing the Security Protocols

RA Abouhogail - IJ Information Technology and Computer …, 2019 - researchgate.net
In this paper, Analysis and comparison of two popular security verification tools namely
Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows …