


default search action
Qais Saif Qassim
Person information
- affiliation: University of Technology and Applied Sciences, Ibri, Oman
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
[c9]Qais Saif Qassim, Nessibeli Y. Askarbekova:
Enhancing ML model efficiency for DDoS attack detection on web servers in resource-constrained environments. DTESI 2024- 2023
[j8]Sara Yahya Kadum, Omar Hussein Salman
, Zahraa K. Taha, Amal Bati Said
, Musab A. M. Ali, Qais Saif Qassim, Mohammed Imad Aal-Nouman
, Duraid Y. Mohammed, Baraa M. Albaker
, Zahraa Adnan Abdalkareem
:
Machine learning-based telemedicine framework to prioritize remote patients with multi-chronic diseases for emergency healthcare services. Netw. Model. Anal. Health Informatics Bioinform. 12(1): 11 (2023)
[c8]Qais Saif Qassim, Musab A. M. Ali, Nooritawati Md Tahir:
Security Analysis of DNP3 Protocol in SCADA System. ICCSCE 2023: 314-319- 2021
[c7]Qais Saif Qassim, Norziana Jamil
, Mohammed Najah Mahdi, Zaihisma Che Cob
, Fiza Abdul Rahim, Lariyah Mohd Sidek
:
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. ACeS 2021: 230-247
[c6]Mohammed Najah Mahdi, Abdul Rahim Ahmad, Qais Saif Qassim, Mohammed Ahmed Subhi
:
Use of Faceted Search: The Effect on Researchers. IVIC 2021: 276-286
[c5]Qais Saif Qassim, Norziana Jamil
, Mohammed Najah Mahdi:
Symptoms-Based Network Intrusion Detection System. IVIC 2021: 482-494- 2020
[j7]Qais Saif Qassim
, Norziana Jamil
, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman:
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system. Int. J. Crit. Infrastructures 16(2): 91-106 (2020)
[c4]Qais Saif Qassim, Norziana Jamil
, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi:
Compromising the Data Integrity of an Electrical Power Grid SCADA System. ACeS 2020: 604-626
2010 – 2019
- 2019
[j6]Qais Saif Qassim
, Norziana Jamil
, Maslina Daud, Hafizah Che Hasan:
Towards implementing scalable and reconfigurable SCADA security testbed in power system environment. Int. J. Crit. Infrastructures 15(2): 91-120 (2019)
[j5]Qais Saif Qassim
, Norziana Jamil
, Maslina Daud, Ahmed Patel, Norhamadi Ja'affar:
A review of security assessment methodologies in industrial control systems. Inf. Comput. Secur. 27(1): 47-61 (2019)
[c3]Qais Saif Qassim
, Abdul Rahim Ahmad
, Roslan Ismail, Asmidar Abu Bakar, Fiza Abdul Rahim
, Mohd Zin Mokhtar, Ramona Ramli
, Busyra Mohd Yusof, Mohammed Najah Mahdi
:
An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems. BigDataSecurity/HPSC/IDS 2019: 267-272- 2017
[j4]Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz:
Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach. Int. J. Secur. Networks 12(1): 13-26 (2017)- 2016
[j3]Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz:
Anomalies Classification Approach for Network-based Intrusion Detection System. Int. J. Netw. Secur. 18(6): 1159-1172 (2016)- 2014
[j2]Qais Qassim, Ahmed Patel, Abdullah Mohd Zin:
Strategy to reduce false alarms in intrusion detection and prevention systems. Int. Arab J. Inf. Technol. 11(5): 500-506 (2014)- 2011
[c2]Siti Nor Hafizah Mohamad, Ahmed Patel, Rodziah Latih, Qais Qassim
, Liu Na
, Yiqi Tew
:
Block-based programming approach: challenges and benefits. ICEEI 2011: 1-5- 2010
[j1]Ahmed Patel, Qais Qassim
, Christopher Wills
:
A survey of intrusion detection and prevention systems. Inf. Manag. Comput. Secur. 18(4): 277-290 (2010)
[c1]Ahmed Patel, Qais Qassim, Zarina Shukor, Jose Nogueira, Joaquim Celestino Júnior, Christopher Wills:
Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System. SAISMC 2010: 223-234
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-09 23:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







