Abdun Naser Mahmood

Orcid: 0000-0001-7769-3384

According to our database1, Abdun Naser Mahmood authored at least 87 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ICS-LTU2022: A dataset for ICS vulnerabilities.
Comput. Secur., 2025

2024
Hybrid IRS-Assisted Secure Satellite Downlink Communications: A Fast Deep Reinforcement Learning Approach.
IEEE Trans. Emerg. Top. Comput. Intell., August, 2024

A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms.
ACM Comput. Surv., June, 2024

A systematic literature review on Windows malware detection: Techniques, research issues, and future directions.
J. Syst. Softw., March, 2024

A Secure Federated Learning Framework for Residential Short-Term Load Forecasting.
IEEE Trans. Smart Grid, 2024

Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach.
CoRR, 2024

EarlyMalDetect: A Novel Approach for Early Windows Malware Detection Based on Sequences of API Calls.
CoRR, 2024

MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations.
Comput. Secur., 2024

2023
Physical Layer Security in IRS-Assisted Cache-Enabled Satellite Communication Networks.
IEEE Trans. Green Commun. Netw., December, 2023

HiCoOB: Hierarchical Concurrent Optimistic Blockchain Consensus Protocol for Peer-to-Peer Energy Trading Systems.
IEEE Trans. Smart Grid, September, 2023

API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques.
J. Netw. Comput. Appl., September, 2023

USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data.
IEEE Trans. Dependable Secur. Comput., 2023

False data injection threats in active distribution systems: A comprehensive survey.
Future Gener. Comput. Syst., 2023

A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids.
ACM Comput. Surv., 2023

FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination.
CoRR, 2023

SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues.
Comput. Secur., 2023

FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2022

A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges.
Future Gener. Comput. Syst., 2022

MalDetConv: Automated Behaviour-based Malware Detection Framework Based on Natural Language Processing and Deep Learning Techniques.
CoRR, 2022

Adversarial Models Towards Data Availability and Integrity of Distributed State Estimation for Industrial IoT-Based Smart Grid.
CoRR, 2022

FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers.
CoRR, 2022

2021
An Architecture and Performance Evaluation of Blockchain-Based Peer-to-Peer Energy Trading.
IEEE Trans. Smart Grid, 2021

Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid.
Sensors, 2021

On Edge Caching in Satellite - IoT Networks.
IEEE Internet Things Mag., 2021

A Taxonomy of Supervised Learning for IDSs in SCADA Environments.
ACM Comput. Surv., 2021

A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grid.
CoRR, 2021

Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts.
CoRR, 2021

Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial Networks.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

2020
Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

A Spatiotemporal Data Summarization Approach for Real-Time Operation of Smart Grid.
IEEE Trans. Big Data, 2020

Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications.
Neural Comput. Appl., 2020

Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences.
Comput. Secur., 2020

Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication.
IEEE Access, 2020

TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems.
IEEE Access, 2020

2019
Multi-State Energy Classifier to Evaluate the Performance of the NILM Algorithm.
Sensors, 2019

A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure.
Clust. Comput., 2019

2018
Computing Hierarchical Summary from Two-Dimensional Big Data Streams.
IEEE Trans. Parallel Distributed Syst., 2018

2017
HPC-Based Intelligent Volt/VAr Control of Unbalanced Distribution Smart Grid in the Presence of Noise.
IEEE Trans. Smart Grid, 2017

A Technique for Efficient Query Estimation over Distributed Data Streams.
IEEE Trans. Parallel Distributed Syst., 2017

Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids.
IEEE Trans. Ind. Informatics, 2017

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements.
J. Comput. Syst. Sci., 2017

2016
A survey of network anomaly detection techniques.
J. Netw. Comput. Appl., 2016

A survey of anomaly detection techniques in financial domain.
Future Gener. Comput. Syst., 2016

Estimation of smart grid topology using SCADA measurements.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Computing Hierarchical Summary of the Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements.
Proceedings of the Intelligence and Security Informatics - 11th Pacific Asia Workshop, 2016

2015
An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling.
EAI Endorsed Trans. Scalable Inf. Syst., 2015

Computing discounted multidimensional hierarchical aggregates using modified Misra Gries algorithm.
Perform. Evaluation, 2015

Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid.
Inf. Syst., 2015

An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Predicting dependences using domain-based coupling.
J. Softw. Evol. Process., 2014

PPFSCADA: Privacy preserving framework for SCADA data publishing.
Future Gener. Comput. Syst., 2014

Uncertainty And Evolutionary Optimization: A Novel Approach.
CoRR, 2014

Vulnerabilities of Smart Grid State Estimation against False Data Injection Attack.
CoRR, 2014

Swarm Intelligence Based Multi-phase OPF For Peak Power Loss Reduction In A Smart Grid.
CoRR, 2014

Enhanced Estimation of Autoregressive Wind Power Prediction Model Using Constriction Factor Particle Swarm Optimization.
CoRR, 2014

Cyber Security of Smart Grid Infrastructure.
CoRR, 2014

Forensic Potentials of Solid State Drives.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Heart Disease Diagnosis Using Co-clustering.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

A Novel Approach for Network Traffic Summarization.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

An Efficient Approach for Complex Data Summarization Using Multiview Clustering.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

A summarization paradigm for big data.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
A Probabilistic Model to Predict the Survivability of SCADA Systems.
IEEE Trans. Ind. Informatics, 2013

Subset Selection Classifier (SSC): A Training Set Reduction Method.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Software Clustering Using Automated Feature Subset Selection.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control.
Proceedings of the Security and Privacy in Communication Networks, 2012

2011
SCADASim - A Framework for Building SCADA Simulations.
IEEE Trans. Smart Grid, 2011

Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Netw. Comput. Appl., 2011

Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient.
J. Medical Syst., 2011

A clustering based system for instant detection of cardiac abnormalities from compressed ECG.
Expert Syst. Appl., 2011

Can We Predict Dependencies Using Domain information?
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

2010
Network Traffic Analysis and SCADA Security.
Proceedings of the Handbook of Information and Communication Security, 2010

Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
J. Netw. Comput. Appl., 2010

Survivable SCADA Systems: An Analytical Framework Using Performance Modelling.
Proceedings of the Global Communications Conference, 2010

An Analytical Framework for Evaluating Survivability of SCADA Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Spam filtering for network traffic security on a multi-core environment.
Concurr. Comput. Pract. Exp., 2009

Building a SCADA Security Testbed.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Hierarchical clustering and summarization of network traffic data.
PhD thesis, 2008

An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis.
IEEE Trans. Knowl. Data Eng., 2008

2007
A scalable sampling scheme for clustering in network traffic analysis.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

2006
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis.
Proceedings of the NETWORKING 2006, 2006

2000
Random Shuffling to Reduce Disorder in Adaptive Sorting Scheme
CoRR, 2000


  Loading...