PLC access control: a security analysis H Wardak, S Zhioua, A Almulhem 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016 | 70 | 2016 |
On PLC network security A Ghaleb, S Zhioua, A Almulhem International Journal of Critical Infrastructure Protection 22, 62-69, 2018 | 66 | 2018 |
Network forensics: Notions and challenges A Almulhem 2009 IEEE International Symposium on Signal Processing and Information …, 2009 | 65 | 2009 |
Threat modeling for electronic health record systems A Almulhem Journal of medical systems 36, 2921-2926, 2012 | 45 | 2012 |
A graphical password authentication system A Almulhem 2011 world congress on internet security (WorldCIS-2011), 223-225, 2011 | 42 | 2011 |
Digital fingerprinting based on keystroke dynamics. AAE Ahmed, I Traore, A Ahmed HAISA, 94-104, 2008 | 39 | 2008 |
Experience with engineering a network forensics system A Almulhem, I Traore International Conference on Information Networking, 62-71, 2005 | 38 | 2005 |
Scada-sst: a scada security testbed A Ghaleb, S Zhioua, A Almulhem 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016 | 35 | 2016 |
Threat modeling of a multi-UAV system A Almulhem Transportation Research Part A: policy and practice 142, 290-295, 2020 | 31 | 2020 |
A survey of connection-chains detection techniques A Almulhem, I Traore 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2007 | 13 | 2007 |
Light-weight file fragments classification using depthwise separable convolutions KM Saaim, M Felemban, S Alsaleh, A Almulhem IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022 | 12 | 2022 |
Detecting connection-chains: a data mining approach. A Almulhem, I Traore Int. J. Netw. Secur. 10 (1), 62-74, 2010 | 9 | 2010 |
Identification of image fragments for file carving A Al-Sadi, MB Yahya, A Almulhem World Congress on Internet Security (WorldCIS-2013), 151-155, 2013 | 4 | 2013 |
Profiling distributed connection chains A Almulhem, I Traore International Journal of Communication Networks and Distributed Systems 1 (1 …, 2008 | 4 | 2008 |
Mining and Detecting Connection-Chains in Network Traffic A Almulhem, I Traore IFIP International Conference on Trust Management, 47-57, 2007 | 4 | 2007 |
Detection and analysis of connection chains in network forensics A Almulhem | 4 | 2007 |
Connection-chains: A review and taxonomy A Almulhem, I Traore ECE Department, University of Victoria, Tech. Rep. ECE-05.4 12, 2005 | 3 | 2005 |
Zero Trust Architecture: A Systematic Literature Review ML Gambo, A Almulhem | | 2025 |
File Fragment Type Classification using Light-Weight Convolutional Neural Networks M Felemban, M Ghaleb, K Saaim, S Al-Saleh, A Almulhem IEEE Access, 2024 | | 2024 |
Access Control A Almulhem | | 2008 |