Siraj Ahmed Shaikh
Título
Citado por
Citado por
Año
Who's your best friend? Targeted privacy attacks in location-sharing social networks
V Kostakos, J Venkatanathan, B Reynolds, N Sadeh, E Toch, SA Shaikh, ...
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
402011
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
H Chivers, JA Clark, P Nobles, SA Shaikh, H Chen
Information Systems Frontiers 15 (1), 17-34, 2013
352013
Network reconnaissance
SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen
Network Security 2008 (11), 12-16, 2008
312008
Characteristic trade-offs in designing large-scale biometric-based identity management systems
SA Shaikh, JR Rabaiotti
Journal of Network and Computer Applications 33 (3), 342-351, 2010
292010
Towards a testbed for automotive cybersecurity
DS Fowler, M Cheah, SA Shaikh, J Bryans
2017 IEEE International Conference on Software Testing, Verification and …, 2017
212017
Optimising IDS sensor placement
H Chen, JA Clark, SA Shaikh, H Chivers, P Nobles
2010 International Conference on Availability, Reliability and Security, 315-320, 2010
202010
Towards a systematic security evaluation of the automotive Bluetooth interface
M Cheah, SA Shaikh, O Haas, A Ruddle
Vehicular Communications 9, 8-18, 2017
192017
Towards a metric for Open Source Software Quality
SA Shaikh, A Cerone
Electronic Communications of the EASST 20, 2009
192009
Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning
HK Kalutarage, SA Shaikh, Q Zhou, AE James
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-19, 2012
182012
Building an automotive security assurance case using systematic security evaluations
M Cheah, SA Shaikh, J Bryans, P Wooderson
Computers & Security 77, 360-379, 2018
172018
Information security education in the UK: a proposed course in secure e-commerce systems
SA Shaikh
Proceedings of the 1st annual conference on Information security curriculum …, 2004
172004
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
HK Kalutarage, SA Shaikh, IP Wickramasinghe, Q Zhou, AE James
Computers & Electrical Engineering 47, 327-344, 2015
162015
A framework for analysing driver interactions with semi-autonomous vehicles
S Shaikh, P Krishnan
arXiv preprint arXiv:1301.0043, 2013
162013
Towards automated android app collusion detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
arXiv preprint arXiv:1603.02308, 2016
152016
Specifying authentication using signal events in CSP
SA Shaikh, VJ Bush, SA Schneider
Computers & Security 28 (5), 310-324, 2009
152009
Towards viable intrusion detection methods for the automotive controller area network
A Tomlinson, J Bryans, SA Shaikh
2nd ACM Computer Science in Cars Symposium, 2018
142018
A survey of migration of academics in higher education and their impact on host institutions
SA Shaikh
Reflecting Education 5 (1), 16-30, 2009
132009
Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows
A Tomlinson, J Bryans, SA Shaikh, HK Kalutarage
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
122018
Component Certification as a Prerequisite forWidespread OSS Reuse
G Kakarontzas, P Katsaros, I Stamelos
Electronic Communications of the EASST 33, 2010
12*2010
Accumulating evidence of insider attacks
H Chivers, P Nobles, SA Shaikh, JA Clark, H Chen
Proceedings of the 1st International Workshop on Managing Insider Security …, 2009
122009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20