Information integrity in smart grid systems
| Main Authors: | Pathan, Al-Sakib Khan, Fadlullah, Zubair Muhammad, Fouda, Mostafa M., Monowar, Muhammad Mostafa, Korn, Philip |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Elsevier
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/43057/ http://irep.iium.edu.my/43057/1/1-s2.0-S0306437915000939-main.pdf http://irep.iium.edu.my/43057/4/1-s2.0-S0306437915000939-published.pdf |
Similar Items
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
Editorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Crowd Associated Network: Exploiting over a Smart Garbage Management System
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Integration of Smart Healthcare Information System / Premjit Singh Dulku
by: Premjit Singh , Dulku
Published: (2002)
by: Premjit Singh , Dulku
Published: (2002)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
PLS-SEM in Information Systems Research: A Comprehensive Methodological Reference
by: Al-Emran, Mostafa, et al.
Published: (2019)
by: Al-Emran, Mostafa, et al.
Published: (2019)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Technological impact on disaster management information system
by: Islam, Humayun Kadir, et al.
Published: (2004)
by: Islam, Humayun Kadir, et al.
Published: (2004)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Smart information system personal expenses advisory system
by: Lew, Wen Xiong
Published: (2018)
by: Lew, Wen Xiong
Published: (2018)
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
An efficient routing protocol for mobile ad hoc networks with Neighbor Awareness and Multicasting
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Students’ perceptions towards the integration of knowledge management processes in M-Learning Systems: A preliminary study
by: Al-Emran, Mostafa, et al.
Published: (2018)
by: Al-Emran, Mostafa, et al.
Published: (2018)
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Integrated Car Park System for Smart Parking Solution
by: Harprith Kaur, Randhawa, et al.
Published: (2019)
by: Harprith Kaur, Randhawa, et al.
Published: (2019)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
A pragmatic approach of performance evaluation of MPI-OpenMP on a 12 nodes multi-core cluster
by: Abdelgadir , Tageldin, et al.
Published: (2013)
by: Abdelgadir , Tageldin, et al.
Published: (2013)
Intergration of Smart Healthcare Information Systems
/ Premjit Singh Dulku
by: Premjit , Singh Dulku
Published: (2002)
by: Premjit , Singh Dulku
Published: (2002)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Where is the intelligence in computational intelligence?
by: Pathan, Al-Sakib Khan
Published: (2005)
by: Pathan, Al-Sakib Khan
Published: (2005)
Similar Items
-
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013) -
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013) -
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012) -
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012) -
Editorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)