Follow
Riaz Ahmed Shaikh
Riaz Ahmed Shaikh
Associate Professor, School of Computing Sciences, University of East Anglia, UK
Verified email at uea.ac.uk - Homepage
Title
Cited by
Cited by
Year
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2009
4252009
An analysis of fault detection strategies in wireless sensor networks
T Muhammed, RA Shaikh
Journal of Network and Computer Applications 78, 267-287, 2017
1402017
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
932006
Intrusion‐aware trust model for vehicular ad hoc networks
RA Shaikh, AS Alzahrani
Security and Communication Networks 7 (11), 1652-1669, 2014
742014
Dynamic risk-based decision methods for access control systems
RA Shaikh, K Adi, L Logrippo
Computers & Security 31 (4), 447-464, 2012
742012
LSec: lightweight security protocol for distributed wireless sensor network
RA Shaikh, S Lee, MAU Khan, YJ Song
IFIP International Conference on Personal Wireless Communications, 367-377, 2006
642006
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
572010
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
RA Shaikh, K Adi, L Logrippo
International Journal of Information Security 16 (1), 91–113, 2017
492017
Security and privacy for IoT and fog computing paradigm
A Rauf, RA Shaikh, A Shah
2018 15th Learning and Technology Conference (L&T), 96-101, 2018
382018
Validation of consistency and completeness of access control policy sets
RA Shaikh, K Adi, L Logrippo, S Mankovskii
US Patent 8,904,472, 2014
382014
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
362007
Securing distributed wireless sensor networks: Issues and guidelines
RA Shaikh, S Lee, YJ Song, Y Zhung
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
342006
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
272020
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
252020
Inconsistency detection method for access control policies
RA Shaikh, K Adi, L Logrippo, S Mankovski
Information Assurance and Security (IAS), 2010 Sixth International …, 2010
232010
Analysis and Comparison of Access Control Policies Validation Mechanisms
M Aqib, RA Shaikh
I. J. Computer Network and Information Security 7 (1), 54-69, 2015
212015
Risk-based decision method for access control systems
RA Shaikh, K Adi, L Logrippo, S Mankovski
2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011
202011
A trust-based approach to control privacy exposure in ubiquitous computing environments
PD Giang, LX Hung, RA Shaikh, Y Zhung, S Lee, YK Lee, H Lee
IEEE International Conference on Pervasive Services, 149-152, 2007
202007
A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks
MH Junejo, AAH Ab Rahman, RA Shaikh, K Mohamad Yusof, I Memon, ...
Scientific Programming 2020, 2020
182020
A Survey on Secure Routing Protocols in Wireless Sensor Networks
Y Arfat, RA Shaikh
International Journal of Wireless and Microwave Technologies 6 (3), 9-19, 2016
172016
The system can't perform the operation now. Try again later.
Articles 1–20