scispace - formally typeset
Q

Qais Saif Qassim

Researcher at Universiti Tenaga Nasional

Publications -  28
Citations -  387

Qais Saif Qassim is an academic researcher from Universiti Tenaga Nasional. The author has contributed to research in topics: SCADA & Intrusion detection system. The author has an hindex of 7, co-authored 25 publications receiving 248 citations. Previous affiliations of Qais Saif Qassim include National University of Malaysia.

Papers
More filters
Journal ArticleDOI

A survey of intrusion detection and prevention systems

TL;DR: The problem of protecting information and data flows has existed from the very first day of information exchange, and the widespread use of wired and wireless communication networks, internet, web applications and computing has increased the gravity of the problem.
Journal ArticleDOI

From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A Survey

TL;DR: A thorough review of 370 papers on the application of energy, IoT and machine learning in 5G and 6G from three major libraries: Web of Science, ACM Digital Library, and IEEE Explore is presented.
Journal ArticleDOI

A Survey of SCADA Testbed Implementation Approaches

TL;DR: This paper reviews common SCADA implementation approaches utilized in previous related works and examines security vulnerability and loopholes in the system to develop and test security solutions developed to protect SCADA systems.

Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System.

TL;DR: A new agent-based self-managed approach of anomaly intrusion prevention system based on risk assessment and managed by the principles of the Autonomic Computing (AC) concept, which has all the flavors of self-management is put forward.
Journal ArticleDOI

A review of security assessment methodologies in industrial control systems

TL;DR: This paper presents a review and a comparative analysis of several standard SCADA security assessment methodologies and guidelines published by internationally recognised bodies and explores the adequacy of the existing methodologies in meeting cyber security assessment practices required for electrical power networks.