selected publications
-
academic article
-
Reda HTMahmood ADiro AChilamkurti NKallam S. Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications.
Neural Computing and Applications.
32:16011-16023.
2020
Full text if available -
Alsaedi AMoustafa NTari ZMahmood AAnwar A. TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven Intrusion Detection Systems.
IEEE Access.
8:165130-165150.
2020
Full text if available -
Suaboot JFahad ATari ZGrundy JMahmood ANAlmalawi AZomaya AYDrira K. A Taxonomy of Supervised Learning for IDSs in SCADA Environments.
ACM Computing Surveys.
53:1-37.
2020
Full text if available -
Diro AReda HChilamkurti NMahmood AZaman NNam Y. Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication.
IEEE Access.
8:60539-60551.
2020
Full text if available -
Anwar AMahmood ARay BMahmud MATari Z. Machine learning to ensure data integrity in power system topological network database.
Electronics (Switzerland).
9:1-17.
2020
Full text if available -
Suaboot JTari ZMahmood AZomaya AYLi W. Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences.
Computers and Security.
92.
2020
Full text if available -
Desai SVAlhadad RChilamkurti NMahmood A. A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure.
Cluster Computing.
22:43-69.
2019
Full text if available -
Desai SVAlhadad RMahmood AChilamkurti NRho S. Multi-state energy classifier to evaluate the performance of the NILM algorithm.
Sensors.
19.
2019
Full text if available -
Shah ZMahmood ANBarlow MGTari ZYi XZomaya A. Computing hierarchical summary from two-dimensional big data streams.
IEEE Transactions on Parallel and Distributed Systems.
29:803-818.
2018
Full text if available -
Shah ZAnwar AMahmood ANTari ZZomaya AY. A Spatio-temporal Data Summarization Paradigm for Real-time Operation of Smart Grid.
IEEE Transactions on Big Data.
6:1-14.
2017
Full text if available -
Shah ZMahmood ANTari ZZomaya AY. A Technique for Efficient Query Estimation over Distributed Data Streams.
IEEE Transactions on Parallel and Distributed Systems.
28:2770-2783.
2017
Full text if available -
Anwar AMahmood ANTari Z. Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids.
IEEE Transactions on Industrial Informatics.
13:3299-3311.
2017
Full text if available -
Mahmood ANTaheri JTari ZZomaya AYAnwar A. HPC based Intelligent Volt/VAr Control of Unbalanced Distribution Smart Grid in the presence of Noise.
IEEE Transactions on Smart Grid.
8:1446-1459.
2017
Full text if available -
Anwar AMahmood ANPickering M. Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements.
Journal of Computer and System Sciences.
83:58-72.
2017
Full text if available -
Ahmed MMahmood ANIslam MR. A survey of anomaly detection techniques in financial domain.
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.
55:278-288.
2016
Full text if available -
Ahmed MMahmood ANHu J. A survey of network anomaly detection techniques.
Journal of Network and Computer Applications.
60:19-31.
2016
Full text if available -
Anwar AMahmood AN. Anomaly detection in electric network database of smart grid: Graph matching approach.
Electric Power Systems Research.
133:51-62.
2016
Full text if available -
Ahmed MMahmood ANMaher MJ. An efficient technique for network traffic summarization using multiview clustering and statistical sampling.
EAI Endorsed Transactions on Scalable Information Systems.
2.
2015
Full text if available -
Ahmed MAnwar AMahmood ANShah ZMaher MJ. An investigation of performance analysis of anomaly detection techniques for big data in SCADA systems..
EAI Endorsed Transactions on Scalable Information Systems.
2:1-16.
2015
Full text if available -
Shah ZMahmood ANBarlow M. Computing discounted multidimensional hierarchical aggregates using modified Misra Gries algorithm.
Performance Evaluation.
91:170-186.
2015
Full text if available -
Anwar AMahmood ANTari Z. Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid.
Information Systems Journal: an international journal promoting the study and practice of information systems.
53:201-212.
2015
Full text if available -
Kabir MEMahmood ANMustafa AKWang H. Microaggregation sorting framework for K-Anonymity statistical disclosure control in cloud computing.
IEEE Transactions on Cloud Computing.
PP:1-22.
2015
Full text if available -
Ahmed MMahmood AN. Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection.
Annals of Data Science.
2:111-130.
2015
Full text if available -
Fahad ATari ZAlmalawi AGoscinski AKhalil IMahmood A. PPFSCADA: privacy preserving framework for SCADA data publishing.
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.
37:496-511.
2014
Full text if available -
Rahman RHIslam RAltas IMahmood ANAbawajy J. WITHDRAWN: An adaptive path hiding technique for participatory sensing networks.
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.
0-0.
2014
Full text if available -
Aryani APerin FLungu MMahmood ANNierstrasz O. Predicting dependences using domain-based coupling.
Journal of software: Evolution and Process.
26:50-76.
2014
Full text if available -
Queiroz CMahmood ATari Z. A probabilistic model to predict the survivability of SCADA systems.
IEEE Transactions on Industrial Informatics.
9:1975-1985.
2013
Full text if available -
Sufi FKhalil IMahmood AN. A clustering based system for instant detection of cardiac abnormalities from compressed ECG.
Expert Systems with Applications.
38:4705-4713.
2011
Full text if available -
Sufi FKhalil IMahmood A. Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient.
Journal of Medical Systems.
35:1349-1358.
2011
Full text if available -
Queiroz CMahmood ATari Z. SCADASim-A Framework for Building SCADA Simulations.
IEEE Transactions on Smart Grid.
2:589-597.
2011
Full text if available -
Hu JKhalil IHan SMahmood A. Seamless integration of dependability and security concepts in SOA: a feedback control system based framework and taxonomy.
Journal of Network and Computer Applications.
34:1150-1159.
2011
Full text if available -
Mahmood ANHu JTari ZLeckie C. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
Journal of Network and Computer Applications.
33:491-502.
2010
Full text if available -
Mahmood ALeckie CUdaya P. Creating Concise Summaries of Network Traffic Using Hierarchical Clustering.
Bangladesh Journal of Scientific and Industrial Research.
44:281-288.
2010
-
Islam RZhou WXiang YMahmood AN. Spam filtering for network traffic security on a multi-core environment.
Concurrency and Computation: Practice and Experience.
21:1307-1320.
2009
Full text if available -
Mahmood ANLeckie CUdaya P. An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis.
IEEE Transactions on Knowledge and Data Engineering.
20:752-767.
2008
Full text if available -
Karim MMahmood ANothers. Random Shuffling to Reduce Disorder in Adaptive Sorting Scheme.
Arxiv preprint cs/0012002.
2000
-
Abir SMAAIslam SNAnwar AMahmood ANOo AMT. Building Resilience against COVID-19 Pandemic Using Artificial Intelligence, Machine Learning, and IoT: A Survey of Recent Progress.
IoT.
1:506-528.
Full text if available
-
Reda HTMahmood ADiro AChilamkurti NKallam S. Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications.
Neural Computing and Applications.
32:16011-16023.
2020
-
chapter
-
Islam MMahmood ANWatters PAlazab M. Forensic Detection of Child Exploitation Material Using Deep Learning.
211-219.
2019
Full text if available -
Islam MWatters PMahmood ANAlazab M. Toward Detection of Child Exploitation Material: A Forensic Approach.
221-246.
2019
Full text if available -
Tari ZKhalil IAlmalawi AFahad AZomaya AYMahmood AQueiroz C. Supervisory Control and Data Acquisition (SCADA): An Introduction
2016
Full text if available -
Anwar AMahmood AN. Cyber Security of Smart Grid Infrastructure.
139-154.
2014
-
Ahmed MMahmood ANHu J. Outlier Detection.
3-21.
2014
-
Anwar AMahmood AN. Vulnerabilities of Smart Grid State Estimation Against False Data Injection Attack.
Green Energy and Technology.
411-428.
2014
Full text if available -
Mahmood ANLeckie CHu JTari ZAtiquzzaman M. Network Traffic Analysis and SCADA Security.
383-405.
2010
Full text if available
-
Islam MMahmood ANWatters PAlazab M. Forensic Detection of Child Exploitation Material Using Deep Learning.
211-219.
2019
-
conference paper
-
Tari ZThompson AAlmusalam NBertok PMahmood AN. MicroGRID: An Accurate and Efficient Real-Time Stream Data Clustering with Noise.
Lecture Notes in Computer Science.
483-494.
2018
Full text if available -
Shah ZMahmood ANBarlow M. Computing hierarchical summary of the data streams.
Lecture Notes in Computer Science.
168-179.
2016
Full text if available -
Anwar AMahmood ANPickering M. Data-driven stealthy injection attacks on smart grid with incomplete measurements.
Lecture Notes in Computer Science.
180-192.
2016
Full text if available -
Anwar AMahmood APickering M. Estimation of Smart Grid Topology using SCADA Measurements.
2016 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM).
2016
Full text if available -
Anwar AMahmood AN. Stealthy and blind false injection attacks on SCADA EMS in the presence of gross errors.
IEEE Power and Energy Society General Meeting.
1-5.
2016
Full text if available -
Anwar AMahmood ANShah Z. A data-driven approach to distinguish cyber-attacks from physical faults in a smart grid.
Proceedings of the 24th ACM International on Conference on Information and Knowledge Management.
1811-1814.
2015
Full text if available -
Ahmed MMahmood ANMaher MJ. A novel approach for network traffic summarization.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
51-60.
2015
Full text if available -
Shah ZMahmood AN. A summarization paradigm for big data.
Proceedings - 2014 IEEE International Conference on Big Data, IEEE Big Data 2014.
61-63.
2015
Full text if available -
Ahmed MMahmood ANMaher MJ. An efficient approach for complex data summarization using multiview clustering.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
38-47.
2015
Full text if available -
Anwar AMahmood ANAhmed M. False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
252-266.
2015
Full text if available -
Shah ZMahmood ANSlay J. Forensic potentials of solid state drives.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
113-126.
2015
Full text if available -
Ahmed MMahmood ANMaher MJ. Heart disease diagnosis using co-clustering.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
61-70.
2015
Full text if available -
Ahmed MMahmood AN. Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
204-219.
2015
Full text if available -
Mahmood ANKabir MEMustafa AK. Novel iterative min-max clustering to minimize information loss in statistical disclosure control.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
157-172.
2015
Full text if available -
Anwar AMahmood AN. CF-PSO based loss sensitivity clustering technique to identify optimal DG allocation nodes for energy efficient smart grid operation.
Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014.
1130-1135.
2014
Full text if available -
Anwar AMahmood ANIslam R. CHPSO - A new collaborative hybrid particle swarm optimization algorithm.
Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014.
1768-1773.
2014
Full text if available -
Ahmed MMahmood AN. Clustering based semantic data summarization technique: A new approach.
Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014.
1780-1785.
2014
Full text if available -
Anwar AMahmood AN. Enhanced estimation of Autoregressive wind power prediction model using Constriction Factor Particle Swarm Optimization.
Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014.
1136-1140.
2014
Full text if available -
Ahmed MMahmood AN. Network traffic analysis based on collective anomaly detection.
Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014.
1141-1146.
2014
Full text if available -
Shah ZMahmood ANOrgun MAMashinchi MH. Subset selection classifier (SSC): A training set reduction method.
Proceedings - 16th IEEE International Conference on Computational Science and Engineering, CSE 2013.
862-869.
2014
Full text if available -
Anwar AMahmood AN. Swarm intelligence based multi-phase OPF for peak power loss reduction in a smart grid.
IEEE Power and Energy Society General Meeting.
1-5.
2014
Full text if available -
Bhattacharya MIslam RMahmood AN. Uncertainty and evolutionary optimization: A novel approach.
Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications, ICIEA 2014.
988-993.
2014
Full text if available -
Shah ZMahmood ANMustafa AK. A hybrid approach to improving clustering accuracy using SVM.
Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013.
783-788.
2013
Full text if available -
Ahmed MMahmood AN. A novel approach for outlier detection and clustering improvement.
Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013.
577-582.
2013
Full text if available -
Kabir MEMahmood ANMustafa AK. K-means clustering microaggregation for statistical disclosure control.
Advances in Soft Computing.
1109-1115.
2013
Full text if available -
Mahmood ANKabir MEMustafa AK. New multi-dimensional sorting based K-anonymity microaggregation for statistical disclosure control.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
256-272.
2013
Full text if available -
Shah ZNaseem ROrgun MAMahmood AShahzad S. Software clustering using automated feature subset selection.
Lecture Notes in Computer Science.
47-58.
2013
Full text if available -
Aryani APerin FLungu MMahmood ANNierstrasz O. Can we predict dependencies using domain information?.
Proceedings - Working Conference on Reverse Engineering, WCRE.
55-64.
2011
Full text if available -
Mahmood ANLeckie CIslam RTari Z. Hierarchical Summarization Techniques for Network Traffic.
2011 6th IEEE Conference on Industrial Electronics and Applications (ICIEA).
2474-2479.
2011
Full text if available -
Queiroz CMahmood ATari Z. Survivable SCADA Systems: An Analytical Framework Using Performance Modelling.
2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
2010
Full text if available -
Queiroz CMahmood ATari Z. An Analytical Framework for Evaluating Survivability of SCADA Systems.
2010 10th IEEE International Conference on Computer and Information Technology.
877-881.
2010
Full text if available -
Syeda-Mahmood TBeymer DWang FMahmood ALundstrom RJShafee NHolve T. Automatic selection of keyframes from angiogram videos.
Pattern Recognition (ICPR), 2010 20th International Conference on.
4008-4011.
2010
-
Queiroz Batista Da Silva CMahmood ATari Z. Survivable SCADA systems: An analytical framework using performance modelling.
IEEE GLOBECOM Global Communications Conference Exhibition and Industry Forum.
307-311.
2010
-
Sufi FMahmood AKhalil I. Diagnosis of cardiovascular abnormalities from compressed ECG: A data mining based approach.
2009 9th International Conference on Information Technology and Applications in Biomedicine.
60-63.
2009
Full text if available -
Queiroz CMahmood AHu JTari ZYu X. Building a SCADA Security Testbed.
2009 Third International Conference on Network and System Security.
357-364.
2009
Full text if available -
Mahmood ALeckie CUdaya P. A Scalable Sampling Scheme for Clustering in Network Traffic Analysis.
Proceedings of the 2nd International ICST Conference on Scalable Information Systems.
2007
Full text if available -
Mahmood ANLeckie CUdaya P. Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis.
Lecture Notes in Computer Science.
1092-1098.
2006
Full text if available
-
Tari ZThompson AAlmusalam NBertok PMahmood AN. MicroGRID: An Accurate and Efficient Real-Time Stream Data Clustering with Noise.
Lecture Notes in Computer Science.
483-494.
2018
-
thesis