Siraj Ahmed Shaikh
Citado por
Citado por
Who's your best friend? Targeted privacy attacks in location-sharing social networks
V Kostakos, J Venkatanathan, B Reynolds, N Sadeh, E Toch, SA Shaikh, ...
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
H Chivers, JA Clark, P Nobles, SA Shaikh, H Chen
Information Systems Frontiers 15 (1), 17-34, 2013
Network reconnaissance
SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen
Network Security 2008 (11), 12-16, 2008
Characteristic trade-offs in designing large-scale biometric-based identity management systems
SA Shaikh, JR Rabaiotti
Journal of Network and Computer Applications 33 (3), 342-351, 2010
Towards a testbed for automotive cybersecurity
DS Fowler, M Cheah, SA Shaikh, J Bryans
2017 IEEE International Conference on Software Testing, Verification and …, 2017
Optimising IDS sensor placement
H Chen, JA Clark, SA Shaikh, H Chivers, P Nobles
2010 International Conference on Availability, Reliability and Security, 315-320, 2010
Towards a systematic security evaluation of the automotive Bluetooth interface
M Cheah, SA Shaikh, O Haas, A Ruddle
Vehicular Communications 9, 8-18, 2017
Towards a metric for Open Source Software Quality
SA Shaikh, A Cerone
Electronic Communications of the EASST 20, 2009
Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning
HK Kalutarage, SA Shaikh, Q Zhou, AE James
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-19, 2012
Building an automotive security assurance case using systematic security evaluations
M Cheah, SA Shaikh, J Bryans, P Wooderson
Computers & Security 77, 360-379, 2018
Information security education in the UK: a proposed course in secure e-commerce systems
SA Shaikh
Proceedings of the 1st annual conference on Information security curriculum …, 2004
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
HK Kalutarage, SA Shaikh, IP Wickramasinghe, Q Zhou, AE James
Computers & Electrical Engineering 47, 327-344, 2015
A framework for analysing driver interactions with semi-autonomous vehicles
S Shaikh, P Krishnan
arXiv preprint arXiv:1301.0043, 2013
Towards automated android app collusion detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
arXiv preprint arXiv:1603.02308, 2016
Specifying authentication using signal events in CSP
SA Shaikh, VJ Bush, SA Schneider
Computers & Security 28 (5), 310-324, 2009
Towards viable intrusion detection methods for the automotive controller area network
A Tomlinson, J Bryans, SA Shaikh
2nd ACM Computer Science in Cars Symposium, 2018
A survey of migration of academics in higher education and their impact on host institutions
SA Shaikh
Reflecting Education 5 (1), 16-30, 2009
Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows
A Tomlinson, J Bryans, SA Shaikh, HK Kalutarage
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Component Certification as a Prerequisite forWidespread OSS Reuse
G Kakarontzas, P Katsaros, I Stamelos
Electronic Communications of the EASST 33, 2010
Accumulating evidence of insider attacks
H Chivers, P Nobles, SA Shaikh, JA Clark, H Chen
Proceedings of the 1st International Workshop on Managing Insider Security …, 2009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20