| A survey of network anomaly detection techniques M Ahmed, AN Mahmood, J Hu Journal of Network and Computer Applications 60, 19-31, 2016 | 2491 | 2016 |
| TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems A Alsaedi, N Moustafa, Z Tari, A Mahmood, A Anwar IEEE Access 8, 165130-165150, 2020 | 841 | 2020 |
| A survey of anomaly detection techniques in financial domain M Ahmed, AN Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 782 | 2016 |
| SCADASim—A framework for building SCADA simulations C Queiroz, A Mahmood, Z Tari IEEE Transactions on Smart Grid 2 (4), 589-597, 2011 | 234 | 2011 |
| SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues M Alanazi, A Mahmood, MJM Chowdhury Computers & security 125, 103028, 2023 | 197 | 2023 |
| Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts HT Reda, A Anwar, A Mahmood Renewable and Sustainable Energy Reviews 163, 112423, 2022 | 186 | 2022 |
| An architecture and performance evaluation of blockchain-based peer-to-peer energy trading J Abdella, Z Tari, A Anwar, A Mahmood, F Han IEEE Transactions on Smart Grid 12 (4), 3364-3378, 2021 | 186 | 2021 |
| Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication A Diro, H Reda, N Chilamkurti, A Mahmood, N Zaman, Y Nam IEEE Access 8, 60539-60551, 2020 | 148 | 2020 |
| Building a SCADA security testbed C Queiroz, A Mahmood, J Hu, Z Tari, X Yu 2009 Third International Conference on Network and System Security, 357-364, 2009 | 131 | 2009 |
| Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid A Anwar, AN Mahmood, Z Tari Information Systems 53, 201-212, 2015 | 120 | 2015 |
| Cyber security of smart grid infrastructure A Anwar, AN Mahmood State of the Art in Intrusion Prevention and Detection, 139-152, 2014 | 111 | 2014 |
| A novel approach for outlier detection and clustering improvement M Ahmed, AN Mahmood Industrial Electronics and Applications (ICIEA), 2013 8th IEEE Conference on …, 2013 | 110 | 2013 |
| A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges P Maniriho, AN Mahmood, MJM Chowdhury Future Generation Computer Systems 130, 1-18, 2022 | 109 | 2022 |
| Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection M Ahmed, AN Mahmood Annals of Data Science 2 (1), 111-130, 2015 | 108 | 2015 |
| A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure S Desai, R Alhadad, N Chilamkurti, AN Mahmood Cluster Computing, 1-27, 2018 | 100 | 2018 |
| Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements A Anwar, AN Mahmood, M Pickering Journal of Computer and System Sciences 83 (1), 58-72, 2017 | 99 | 2017 |
| API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques P Maniriho, AN Mahmood, MJM Chowdhury Journal of Network and Computer Applications 218, 103704, 2023 | 94 | 2023 |
| Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing ME Kabir, AN Mahmood, H Wang, AK Mustafa IEEE Transactions on Cloud Computing 8 (2), 408-417, 2015 | 88 | 2015 |
| Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid HT Reda, B Ray, P Peidaee, A Anwar, A Mahmood, A Kalam, N Islam Sensors 21 (4), 1554, 2021 | 75 | 2021 |
| A Taxonomy of Supervised Learning for IDSs in SCADA Environments J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ... ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020 | 75 | 2020 |