Mustafa Mustafa

ORCID: 0000-0002-8772-8023
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Blockchain Technology Applications and Security
  • Smart Grid Energy Management
  • Islamic Finance and Communication
  • Education and Character Development
  • Cryptography and Data Security
  • Educational Methods and Media Use
  • SMEs Development and Digital Marketing
  • Privacy-Preserving Technologies in Data
  • Educational Curriculum and Learning Methods
  • Engineering and Technology Innovations
  • Educational Methods and Outcomes
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Islamic Studies and Radicalism
  • Pancasila Values in Education
  • Context-Aware Activity Recognition Systems
  • STEM Education
  • Internet Traffic Analysis and Secure E-voting
  • Arabic Language Education Studies
  • Educational Methods and Impacts
  • Food and Agricultural Sciences
  • Adversarial Robustness in Machine Learning
  • Edcuational Technology Systems
  • Legal Studies and Policies

Tadulako University
2015-2025

Politeknik Negeri Samarinda
2013-2025

Universitas 17 Agustus 1945 Samarinda
2013-2025

University of Manchester
2013-2024

KU Leuven
2015-2024

IMEC
2017-2024

Universitas Pembangunan Panca Budi Medan
2021-2024

State University of Makassar
2020-2024

Universitas Muslim Indonesia
2021-2024

Universitas 45 Mataram
2024

Peer-to-peer, community or collective self-consumption, and transactive energy markets offer new models for trading locally. Over the past five years, there has been significant growth in amount of academic literature examining how these local might function. This systematic review 139 peer-reviewed journal articles examines market designs used models. A modified version Business Ecosystem Architecture Modelling framework is to extract model information from literature, identify differences...

10.1016/j.rser.2022.112403 article EN cc-by Renewable and Sustainable Energy Reviews 2022-04-19

Abstract Large language models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response fast adoption industrial applications, this survey concerns safety trustworthiness. First, we review known vulnerabilities limitations the LLMs, categorising them into inherent issues, attacks, unintended bugs. Then, consider if how Verification Validation (V&V)...

10.1007/s10462-024-10824-0 article EN cc-by Artificial Intelligence Review 2024-06-17

Smart grid allows fine-grained smart metering data collection which can improve the efficiency and reliability of grid. Unfortunately, this vast also imposes risks to users' privacy. In paper, we propose a novel protocol that suppliers operators collect aggregate in secure privacy-preserving manner. We use multiparty computation ensure privacy protection. addition, three different aggregation algorithms offer balances between privacy-protection performance. Our is designed for realistic...

10.1109/tsg.2019.2906016 article EN IEEE Transactions on Smart Grid 2019-03-19

The management of security and privacy protection mechanisms is one fundamental issue future smart grid (SG) metering networks. Designing effective economical measures a nontrivial task due to the following: 1) large number system requirements; 2) uncertainty over how functionalities are going be specified evolve. This paper explores unified approach for addressing (SM) systems. In process, we present framework that entails analysis synthesis solutions associated with closely interrelated...

10.1109/jsyst.2013.2260940 article EN IEEE Systems Journal 2013-07-09

This paper provides a comprehensive security analysis of the Electric Vehicle (EV) charging service in Smart Grid (SG) environment (i.e. "smart" EV application). It first describes three scenarios, at home, work and public places. Based on these use-case presents model for smart charging, consisted application entities interactions among them. then illustrates potential message types communicated entities. this exchanged messages, analyses problems threats imposed entities, which leads to...

10.1109/isgt.2013.6497830 article EN 2013-02-01

This paper proposes a local electricity trading market and provides comprehensive security analysis of this market. It first presents for among individual users, describes the different entities interactions them. Based on model interactions, analyses problems potential privacy threats imposed which leads to specification set requirements. These requirements can be used guide future design secure markets or perform risk assessment such markets.

10.1109/isgteurope.2016.7856269 article EN 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) 2016-10-01

This paper proposes a novel solution, called decentralized, efficient, privacy-preserving, and selective aggregation (DEP2SA) scheme, designed to support secure user privacy-preserving data collection in the advanced metering infrastructure. DEP2SA is more efficient applicable real-life deployment, as compared with state of art, by adopting adapting number key technologies: 1) it uses multi-recipient system model, making liberalized electricity market; 2) homomorphic Paillier encryption...

10.1109/access.2015.2506198 article EN cc-by IEEE Access 2015-01-01

This study aims to examine the phenomena that occur due projectile penetration on fiber metal laminate. Ballistic testing was carried out experimentally according National Institute of Justice standards (NIJ Standard 0101.06 level III-A) using a 9 mm full-metal jacket with normal angle attack (90° target). The results showed laminate could withstand rate by penetrating first layer (aluminum plate) and second (aramid/epoxy), while last deformed form bulge. pierced aluminum plate is...

10.21776/mechta.2025.006.01.3 article EN cc-by International Journal of Mechanical Engineering Technologies and Applications 2025-01-13

In the current era, science and technology (IPTEK) is growing developing. facing 21st century, humans must have 4C skills. Developing skills can be done through a learning process that contains STEAM based on Loose Parts. However, reality there are still early childhood education institutions apply classical learning, so they considered less than optimal in providing stimulation of for children from an age. The purpose this study to provide overview form description implementation Part. For...

10.59653/jimat.v3i01.1376 article EN cc-by-sa Jurnal Riset Multidisiplin dan Inovasi Teknologi 2025-01-27

The lack of motivation children to learn numeracy is due the tools used in delivering material that are not interesting, teachers always use worksheets, methods by less varied, teachers' creativity utilizing materials around them still lacking so feel bored and tend play alone without paying attention presented teacher. Therefore, researchers will loosepart media improve children's development. This study uses a qualitative method with descriptive approach aims determine level development...

10.59653/jemls.v3i01.1371 article EN cc-by-sa Journal of Education Method and Learning Strategy 2025-01-27

Majelis taklim Attawabien merupakan tempat kegiatan siar islam yang memiliki lingkungan cukup komplek. Termasuk komponen didalamnya meliputi sarana pengajian berupa meja, kursi dan alquran serta buku-buku penunjang lainnya bervariasi beserta fasilitas peralatannya. Sarana, peralatan digunakan harus dipelihara sesuai dengan teknis fungsinya guna menjaga keamanan mencegah terjadinya resiko bahaya termasuk kebakaran. Upaya ini dilaksanakan dalam rangka memberikan rasa aman kepada para anak...

10.46964/etam.v5i1.1138 article ID cc-by-sa Jurnal ETAM 2025-02-10

Banyak industri, khususnya di bagian warehouse yang sudah menggunakannya untuk memindahkan barang tidak dapat diangkat oleh tenaga manusia. Pengoperasian truk garpu juga bisa Anda lakukan baik indoor maupun outdoor. Beberapa peralatan dan utilitas telah dikembangkan mencapai hal ini, antaranya, terutama ketika bekerja dalam gedung, adalah menggunakan forklift. Dalam pengoperasian alat berat banyak aspek harus diperhatikan, mulai dari ketrampilan skill operator, prosedur alat, keselamatan...

10.46964/etam.v5i1.1141 article ID cc-by-sa Jurnal ETAM 2025-02-10

In this paper, we propose a secure roaming electric vehicle (EV) charging protocol that helps preserve users' privacy. During session, EV user uses pseudonym of the (known only to user's contracted supplier) which is anonymously signed by private key. This protects identity privacy from other suppliers as well location its own supplier. Further, it allows supplier authenticate and user. Using two-factor authentication approach multiuser supported different legitimate users (e.g. family...

10.1109/smartgridcomm.2014.7007769 article EN 2014-11-01

Sistem Pendidikan nasional yang diselenggarakan di Aceh sesuai dengan Qanun berdasarkan pada nilai-nilai budaya islami membuat sekolah melaksanakan pengembangan potensi siswa mengedepankan islami. Hal tersebut dapat terwujud salah satunya menggunakan bahan ajar atau modul terintegrasi. Berdasarkan dari hasil observasi satu SMA Banda menunjukkan bahwa digunakan hanya buku paket fisika belum Tujuan penelitian ini adalah mengembangkan berbasis integrasi islam dan sains valid, praktis efektif...

10.24815/jpsi.v8i1.15539 article ID Jurnal Pendidikan Sains Indonesia 2020-06-16

Large Language Models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response fast adoption industrial applications, this survey concerns safety trustworthiness. First, we review known vulnerabilities limitations the LLMs, categorising them into inherent issues, attacks, unintended bugs. Then, consider if how Verification Validation (V&V) techniques, which been...

10.48550/arxiv.2305.11391 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Wearable devices can offer services to individuals and the public. However, wearable data collected by cloud providers may pose privacy risks. To reduce these risks while maintaining full functionality, healthcare systems require solutions for privacy-friendly processing sharing that accommodate three main use cases: (i) owners requesting of their own data, multiple requesters (ii) a single or (iii) owners. Existing work lacks owner access control does not efficiently support cases, making...

10.1109/tcc.2024.3375801 article EN IEEE Transactions on Cloud Computing 2024-03-12

This paper proposes a novel physical keyless car sharing system where users can use and share their cars without the need of keys. It also provides comprehensive security privacy analysis such system. first presents high-level model for system, describing its main entities specifying necessary functional requirements to allow (with other users) exchanging Based on this requirements, threat focuses threats affecting system's users' privacy. results in specification an extensive set work be...

10.1109/isc2.2016.7580758 article EN 2022 IEEE International Smart Cities Conference (ISC2) 2016-09-01

This paper proposes two decentralised, secure and privacy-friendly protocols for local electricity trading billing, respectively. The protocol employs a bidding algorithm based upon multiparty computations allows users to trade their excess among themselves. bid selection calculation of the price are performed in decentralised oblivious manner. billing is on simple aggregation technique that suppliers compute customers' monthly bills without learning fine-grained consumption data. We also...

10.48550/arxiv.1801.08354 preprint EN other-oa arXiv (Cornell University) 2018-01-01

This paper performs business, security and privacy analysis of emergent (peer-to-peer) electricity trading markets where individual users (via smart meters) can trade with other market players in a (semi-)decentralised manner.Firstly, high-level overview future is presented, comprehensive explanation offered concerning the evolution current (and future) actors regarding their roles.Secondly, business model matrix deployed to develop discuss detail four scenarios based on customers'...

10.14722/diss.2020.23005 article EN 2020-01-01

This paper proposes a privacy-friendly billing and settlements system for use in peer-to-peer energy trading markets. More specifically, it privacy-enhancing protocol (PESP) which makes of partial homomorphic encryption scheme to facilitate private processing computation smart grid users' monthly bill by semi-trusted third party. In addition, allows minor financial penalties users who participate but do not accurately predict their usage each period and, as such, import or export varying...

10.1109/isgt50606.2022.9817551 article EN 2022-04-24
Coming Soon ...