Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mahmood, Abdun Naser
add a person with the name Mahmood, Abdun Naser
 

Other publications of authors with the same name

A Probabilistic Model to Predict the Survivability of SCADA Systems., , and . IEEE Trans. Industrial Informatics, 9 (4): 1975-1985 (2013)New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 256-272. Springer, (2012)A Novel Approach for Network Traffic Summarization., , and . Infoscale, volume 139 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-60. Springer, (2014)A Technique for Efficient Query Estimation over Distributed Data Streams., , , and . IEEE Trans. Parallel Distrib. Syst., 28 (10): 2770-2783 (2017)Cyber Security of Smart Grid Infrastructure., and . CoRR, (2014)Subset Selection Classifier (SSC): A Training Set Reduction Method., , , and . CSE, page 862-869. IEEE Computer Society, (2013)Building a SCADA Security Testbed., , , , and . NSS, page 357-364. IEEE Computer Society, (2009)Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid., , and . Inf. Syst., (2015)Network Traffic Analysis and SCADA Security., , , , and . Handbook of Information and Communication Security, Springer, (2010)Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient., , and . J. Medical Systems, 35 (6): 1349-1358 (2011)