A
Adil Fahad
Researcher at Al Baha University
Publications - 25
Citations - 1422
Adil Fahad is an academic researcher from Al Baha University. The author has contributed to research in topics: Intrusion detection system & Cluster analysis. The author has an hindex of 11, co-authored 21 publications receiving 1125 citations. Previous affiliations of Adil Fahad include RMIT University.
Papers
More filters
Journal ArticleDOI
A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis
Adil Fahad,Najlaa Alshatri,Zahir Tari,Abdullah Alamri,Ibrahim Khalil,Albert Y. Zomaya,Sebti Foufou,Abdelaziz Bouras +7 more
TL;DR: Concepts and algorithms related to clustering, a concise survey of existing (clustering) algorithms as well as a comparison, both from a theoretical and an empirical perspective are introduced.
Journal ArticleDOI
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
Abdulmohsen Almalawi,Abdulmohsen Almalawi,Xinghuo Yu,Zahir Tari,Adil Fahad,Adil Fahad,Ibrahim Khalil +6 more
TL;DR: Two novel techniques are proposed: an automatic identification of consistent and inconsistent states of SCADA data for any given system, and an automatic extraction of proximity detection rules from identified states.
Journal ArticleDOI
Toward an efficient and scalable feature selection approach for internet traffic classification
TL;DR: A novel way is proposed to identify efficiently and accurately the ''best'' features by first combining the results of some well-known FS techniques to find consistent features, and then using the proposed concept of support to select a smallest set of features and cover data optimality.
Journal ArticleDOI
An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems
TL;DR: An innovative intrusion detection approach to detect SCADA tailored attacks is presented based on a data-driven clustering technique of process parameters, which automatically identifies the normal and critical states of a given system and extracts proximity-based detection rules from the identified states for monitoring purposes.
Proceedings ArticleDOI
SCADAVT-A framework for SCADA security testbed based on virtualization technology
TL;DR: A SCADA security testbed based on virtualization technology is proposed, and a server is introduced which is used as a surrogate for water distribution systems and a case study of two malicious attacks is presented to demonstrate how the testbed can easily monitor and control any automatised processes.