Network forensics: Notions and challenges A Almulhem 2009 IEEE International Symposium on Signal Processing and Information …, 2009 | 63 | 2009 |
PLC access control: a security analysis H Wardak, S Zhioua, A Almulhem 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016 | 62 | 2016 |
On PLC network security A Ghaleb, S Zhioua, A Almulhem International Journal of Critical Infrastructure Protection 22, 62-69, 2018 | 58 | 2018 |
A graphical password authentication system A Almulhem 2011 world congress on internet security (WorldCIS-2011), 223-225, 2011 | 41 | 2011 |
Digital fingerprinting based on keystroke dynamics. AAE Ahmed, I Traore, A Ahmed HAISA, 94-104, 2008 | 38 | 2008 |
Threat modeling for electronic health record systems A Almulhem Journal of medical systems 36, 2921-2926, 2012 | 37 | 2012 |
Experience with engineering a network forensics system A Almulhem, I Traore International Conference on Information Networking, 62-71, 2005 | 37 | 2005 |
Scada-sst: a scada security testbed A Ghaleb, S Zhioua, A Almulhem 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016 | 32 | 2016 |
Threat modeling of a multi-UAV system A Almulhem Transportation Research Part A: policy and practice 142, 290-295, 2020 | 24 | 2020 |
A survey of connection-chains detection techniques A Almulhem, I Traore 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2007 | 13 | 2007 |
Detecting connection-chains: a data mining approach. A Almulhem, I Traore Int. J. Netw. Secur. 10 (1), 62-74, 2010 | 9 | 2010 |
Light-weight file fragments classification using depthwise separable convolutions KM Saaim, M Felemban, S Alsaleh, A Almulhem IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022 | 5 | 2022 |
Mining and detecting connection-chains in network traffic A Almulhem, I Traore Trust Management: Proceedings of IFIPTM 2007: Joint iTrust and PST …, 2007 | 5 | 2007 |
Identification of image fragments for file carving A Al-Sadi, MB Yahya, A Almulhem World Congress on Internet Security (WorldCIS-2013), 151-155, 2013 | 4 | 2013 |
Profiling distributed connection chains A Almulhem, I Traore International Journal of Communication Networks and Distributed Systems 1 (1 …, 2008 | 4 | 2008 |
Detection and analysis of connection chains in network forensics A Almulhem | 4 | 2007 |
Connection-chains: A review and taxonomy A Almulhem, I Traore ECE Department, University of Victoria, Tech. Rep. ECE-05.4 12, 2005 | 3 | 2005 |
Access Control A Almulhem | | 2008 |
Session 3: intelligent control theory and applications E O’Connor, B O’Donnell, J Walsh, H Wardak, S Zhioua, A Almulhem, ... | | |
Session 2: cyber security A Ghaleb, S Zhioua, A Almulhem, AA Yaseen, M Bayart, ... | | |