Seguir
Riaz Ahmed Shaikh
Riaz Ahmed Shaikh
Associate Professor, School of Computing Sciences, University of East Anglia, UK
Dirección de correo verificada de uea.ac.uk - Página principal
Título
Citado por
Citado por
Año
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2009
4422009
An analysis of fault detection strategies in wireless sensor networks
T Muhammed, RA Shaikh
Journal of Network and Computer Applications 78, 267-287, 2017
1812017
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
952006
Intrusion‐aware trust model for vehicular ad hoc networks
RA Shaikh, AS Alzahrani
Security and Communication Networks 7 (11), 1652-1669, 2014
892014
Dynamic risk-based decision methods for access control systems
RA Shaikh, K Adi, L Logrippo
Computers & Security 31 (4), 447-464, 2012
812012
LSec: lightweight security protocol for distributed wireless sensor network
RA Shaikh, S Lee, MAU Khan, YJ Song
IFIP International Conference on Personal Wireless Communications, 367-377, 2006
672006
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
582020
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
RA Shaikh, K Adi, L Logrippo
International Journal of Information Security 16 (1), 91–113, 2017
572017
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
572010
Security and privacy for IoT and fog computing paradigm
A Rauf, RA Shaikh, A Shah
2018 15th Learning and Technology Conference (L&T), 96-101, 2018
492018
Validation of consistency and completeness of access control policy sets
RA Shaikh, K Adi, L Logrippo, S Mankovskii
US Patent 8,904,472, 2014
422014
A DDoS attack mitigation framework for IoT networks using fog computing
MA Lawal, RA Shaikh, SR Hassan
Procedia Computer Science 182, 13-20, 2021
382021
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
372020
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
362007
Securing distributed wireless sensor networks: Issues and guidelines
RA Shaikh, S Lee, YJ Song, Y Zhung
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
352006
A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks
MH Junejo, AAH Ab Rahman, RA Shaikh, K Mohamad Yusof, I Memon, ...
Scientific Programming 2020, 1-21, 2020
262020
Inconsistency detection method for access control policies
RA Shaikh, K Adi, L Logrippo, S Mankovski
Information Assurance and Security (IAS), 2010 Sixth International …, 2010
262010
Analysis and Comparison of Access Control Policies Validation Mechanisms
M Aqib, RA Shaikh
I. J. Computer Network and Information Security 7 (1), 54-69, 2015
252015
Imsi catcher detection method for cellular networks
H Alrashede, RA Shaikh
2019 2nd International Conference on Computer Applications & Information …, 2019
222019
A trust-based approach to control privacy exposure in ubiquitous computing environments
PD Giang, LX Hung, RA Shaikh, Y Zhung, S Lee, YK Lee, H Lee
IEEE International Conference on Pervasive Services, 149-152, 2007
222007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20