scispace - formally typeset
H

Haris M. Khalid

Researcher at Higher Colleges of Technology

Publications -  69
Citations -  834

Haris M. Khalid is an academic researcher from Higher Colleges of Technology. The author has contributed to research in topics: Computer science & Kalman filter. The author has an hindex of 9, co-authored 51 publications receiving 448 citations. Previous affiliations of Haris M. Khalid include Masdar Institute of Science and Technology & Petroleum Institute.

Papers
More filters
Journal ArticleDOI

Distributed Kalman filtering: a bibliographic review

TL;DR: A bibliographical review on distributed Kalman filtering (DKF) is provided and an exhaustive list of publications, linked directly or indirectly to DKF in the open literature is compiled to provide an overall picture of different developing aspects of this area.
Journal ArticleDOI

A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks

TL;DR: A Bayesian-based approximated filter (BAF) has been proposed at each monitoring node using a distributed architecture and can accurately extract the oscillatory parameters from the contaminated measurements.
Journal ArticleDOI

A Prediction Algorithm to Enhance Grid Resilience Toward Cyber Attacks in WAMCS Applications

TL;DR: A multisensor temporal prediction based wide-area control scheme for controlling the smart grid's voltage profile and the performance of the proposed technique in the presence of false-data-injection attacks shows promising results.
Journal ArticleDOI

Immunity Toward Data-Injection Attacks Using Multisensor Track Fusion-Based Model Prediction

TL;DR: Results show the proposed multisensor track-level fusion-based model prediction (TFMP) accurately extracted oscillatory parameters from the contaminated measurements in the presence of multiple system disturbances and random data injections.
Journal ArticleDOI

Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects

TL;DR: Both machine and deep learning methods are presented and analyzed in relation to the detection of cyber attacks in IoT systems and the difficulties faced by the IoT devices or systems after the occurrence of an attack are faced.