A model of artificial intelligence in cyber security of scada to enhance public safety in UAE
The dependence of industrial systems, including Supervisory Control and Data Acquisition (SCADA) systems, on AI technology is growing rapidly. Given the mandate of AI to achieve efficient and effective industrial supervisory systems, the pertinent threats resulting from both internal malfunctions an...
| Main Author: | Alhashmi, Omar |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/28304/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=123819 |
| Abstract | Abstract here |
Similar Items
A DEEP LEARNING MODEL FOR CYBER-PHYSICAL SECURITY IN ICS SCADA SYSTEMS
by: ASAAD BALLA FADL ELMULA BABIKER
Published: (2024)
by: ASAAD BALLA FADL ELMULA BABIKER
Published: (2024)
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
by: Abu, Md Sahrom
Published: (2021)
by: Abu, Md Sahrom
Published: (2021)
A comparative analysis of Parkinson’s disease classification using artificial intelligent techniques for mobile application
by: Lee, Teng Hong
Published: (2025)
by: Lee, Teng Hong
Published: (2025)
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021)
by: Almarri, Ghalib Abdulla
Published: (2021)
An empirical study of the information security awareness model in Oman
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
Developing a mediation relationship model of service quality, basic artificial intelligent and behavioural intention constructs in the use of artificial intelligent security technology in UAE
by: Alafreet Alkuwaiti, Salem Ahmed Abdulla
Published: (2023)
by: Alafreet Alkuwaiti, Salem Ahmed Abdulla
Published: (2023)
Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows
by: Sankor, Salah Mortada Shahen
Published: (2022)
by: Sankor, Salah Mortada Shahen
Published: (2022)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Steganography for securing image data using hybrid SLT and DCT
by: Rachmawanto, Eko Hari
Published: (2012)
by: Rachmawanto, Eko Hari
Published: (2012)
Voltage instability analysis of electric power systems using artificial neural network based approach
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021)
by: Fatin Nabila , Abd Latiff
Published: (2021)
The intelligent silaturrahmi gamification mechanics framework to impose small medium enterprise collaboration
by: Fitri Marisa
Published: (2023)
by: Fitri Marisa
Published: (2023)
The impact of gamification on undergraduate engineers' public speaking anxiety and competency
by: Syed Osman Abadi, Sharifah Aida Hana
Published: (2025)
by: Syed Osman Abadi, Sharifah Aida Hana
Published: (2025)
Information quality structure framework in developing an information security management system (ISMS)
by: Palaniappan, P Siva Shamala
Published: (2017)
by: Palaniappan, P Siva Shamala
Published: (2017)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
Enhanced Hopfield Neural Networks With Artificial Immune System Algorithm For Satisfiability Logic Programming
by: Mansor, Mohd. Asyraf
Published: (2017)
by: Mansor, Mohd. Asyraf
Published: (2017)
The moderating role of artificial intelligence adoption on talents development practices and career resilience in the UAE public sector
by: Al-Mesafri, Amal Hamad
Published: (2024)
by: Al-Mesafri, Amal Hamad
Published: (2024)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
by: Abusalama, Jawad
Published: (2025)
by: Abusalama, Jawad
Published: (2025)
Secure unlinkability schemes for privacy preserving data publishing in weighted social networks / Chong Kah Meng
by: Chong , Kah Meng
Published: (2020)
by: Chong , Kah Meng
Published: (2020)
Digital implementation of artificial neural networks / Saffith Faycal
by: Faycal, Saffith
Published: (1998)
by: Faycal, Saffith
Published: (1998)
The role of artificial intelligence model in forensic DNA methods towards evidence presentation in UAE
by: Altayari, Wafa
Published: (2022)
by: Altayari, Wafa
Published: (2022)
Multi layer feed forward artificial neural network for learning styles identification
by: Bayasut, Bilal Luqman
Published: (2015)
by: Bayasut, Bilal Luqman
Published: (2015)
Enhance Keystroke Dynamic For Online Based System
by: Teh, Teck Guan
Published: (2017)
by: Teh, Teck Guan
Published: (2017)
Enhancing strategic planning in the UAE public sector: the impact of business intelligence and technological capabilities
by: Alketbi, Hamad Mohamed Faris Ali
Published: (2024)
by: Alketbi, Hamad Mohamed Faris Ali
Published: (2024)
ECG encryption enhancement with multi-layers of AES and DNA computing
by: Kh-Madhloom, Jamal
Published: (2023)
by: Kh-Madhloom, Jamal
Published: (2023)
The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations
by: Afiqah, Abdul Razak
Published: (2025)
by: Afiqah, Abdul Razak
Published: (2025)
Optimised hybrid deep learning models for integrated energy modelling and anomaly detection under IPMVP compliance
by: Sukarti, Suziee
Published: (2025)
by: Sukarti, Suziee
Published: (2025)
Modelling awareness of diabetes mellitus : case study at two public health centres
by: Humaira’, Abdul Latif
Published: (2019)
by: Humaira’, Abdul Latif
Published: (2019)
Enhanced sentence extraction through neuro-fuzzy technique for text document summarization
by: Ahmad Kamil, Muhammad Azhari
Published: (2021)
by: Ahmad Kamil, Muhammad Azhari
Published: (2021)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
by: Hameed, Asaad Shakir
Published: (2021)
by: Hameed, Asaad Shakir
Published: (2021)
Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining
by: Dian Sa’adillah Maylawati
Published: (2023)
by: Dian Sa’adillah Maylawati
Published: (2023)
The virtual reality model of mathematical word problems for autistic children
by: Rosli, Zareena
Published: (2025)
by: Rosli, Zareena
Published: (2025)
An enhanced robust association rules method for missing values imputation in Arabic language data set
by: Salem, Awsan Thabet
Published: (2023)
by: Salem, Awsan Thabet
Published: (2023)
Enhancing Harmony Search Parameters Based On Step And Linear Function For Bus Driver Scheduling And Rostering Problems
by: Mansor, Nur Farraliza
Published: (2018)
by: Mansor, Nur Farraliza
Published: (2018)
Public healthcare facility planning in Malaysia : Using location allocation models / S. Sarifah Radiah Shariff
by: S. Sarifah Radiah, Shariff
Published: (2012)
by: S. Sarifah Radiah, Shariff
Published: (2012)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
Mobile application for Solanaceous crop health diagnosis and treatment using a lightweight YOLO Model
by: Khan, Asar
Published: (2025)
by: Khan, Asar
Published: (2025)
Benchmarking framework for IDS classifiers in term of security and performance based on multicriteria analysis
by: Alamleh, Amneh Hussein Mohd
Published: (2022)
by: Alamleh, Amneh Hussein Mohd
Published: (2022)
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
by: Dzakiyullah, Nur Rachman
Published: (2025)
by: Dzakiyullah, Nur Rachman
Published: (2025)
Similar Items
-
A DEEP LEARNING MODEL FOR CYBER-PHYSICAL SECURITY IN ICS SCADA SYSTEMS
by: ASAAD BALLA FADL ELMULA BABIKER
Published: (2024) -
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
by: Abu, Md Sahrom
Published: (2021) -
A comparative analysis of Parkinson’s disease classification using artificial intelligent techniques for mobile application
by: Lee, Teng Hong
Published: (2025) -
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021) -
An empirical study of the information security awareness model in Oman
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
