Segui
Riaz Ahmed Shaikh
Riaz Ahmed Shaikh
Associate Professor, School of Computing Sciences, University of East Anglia, UK
Email verificata su uea.ac.uk - Home page
Titolo
Citata da
Citata da
Anno
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2009
4582009
An analysis of fault detection strategies in wireless sensor networks
T Muhammed, RA Shaikh
Journal of Network and Computer Applications 78, 267-287, 2017
2052017
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
992006
Intrusion‐aware trust model for vehicular ad hoc networks
RA Shaikh, AS Alzahrani
Security and Communication Networks 7 (11), 1652-1669, 2014
922014
Dynamic risk-based decision methods for access control systems
RA Shaikh, K Adi, L Logrippo
Computers & Security 31 (4), 447-464, 2012
822012
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
762020
LSec: lightweight security protocol for distributed wireless sensor network
RA Shaikh, S Lee, MAU Khan, YJ Song
IFIP International Conference on Personal Wireless Communications, 367-377, 2006
672006
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
642010
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
RA Shaikh, K Adi, L Logrippo
International Journal of Information Security 16 (1), 91–113, 2017
562017
Security and privacy for IoT and fog computing paradigm
A Rauf, RA Shaikh, A Shah
2018 15th Learning and Technology Conference (L&T), 96-101, 2018
542018
A DDoS attack mitigation framework for IoT networks using fog computing
MA Lawal, RA Shaikh, SR Hassan
Procedia Computer Science 182, 13-20, 2021
492021
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
452020
Validation of consistency and completeness of access control policy sets
RA Shaikh, K Adi, L Logrippo, S Mankovskii
US Patent 8,904,472, 2014
452014
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
362007
Securing distributed wireless sensor networks: Issues and guidelines
RA Shaikh, S Lee, YJ Song, Y Zhung
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
352006
A privacy‐preserving attack‐resistant trust model for internet of vehicles ad hoc networks
MH Junejo, AAH Ab Rahman, RA Shaikh, K Mohamad Yusof, I Memon, ...
Scientific Programming 2020 (1), 8831611, 2020
332020
IMSI catcher detection method for cellular networks
H Alrashede, RA Shaikh
2019 2nd International Conference on Computer Applications & Information …, 2019
282019
Inconsistency detection method for access control policies
RA Shaikh, K Adi, L Logrippo, S Mankovski
Information Assurance and Security (IAS), 2010 Sixth International …, 2010
262010
Analysis and Comparison of Access Control Policies Validation Mechanisms
M Aqib, RA Shaikh
I. J. Computer Network and Information Security 7 (1), 54-69, 2015
242015
A User-Based Trust Model for Cloud Computing Environment
O Saeed, RA Shaikh
International Journal of Advanced Computer Science and Applications 9 (3 …, 2018
232018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20