Seguir
Riaz Ahmed Shaikh
Riaz Ahmed Shaikh
Associate Professor, School of Computing Sciences, University of East Anglia, UK
Dirección de correo verificada de uea.ac.uk - Página principal
Título
Citado por
Citado por
Año
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2009
4442009
An analysis of fault detection strategies in wireless sensor networks
T Muhammed, RA Shaikh
Journal of Network and Computer Applications 78, 267-287, 2017
1872017
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
952006
Intrusion‐aware trust model for vehicular ad hoc networks
RA Shaikh, AS Alzahrani
Security and Communication Networks 7 (11), 1652-1669, 2014
902014
Dynamic risk-based decision methods for access control systems
RA Shaikh, K Adi, L Logrippo
Computers & Security 31 (4), 447-464, 2012
812012
LSec: lightweight security protocol for distributed wireless sensor network
RA Shaikh, S Lee, MAU Khan, YJ Song
IFIP International Conference on Personal Wireless Communications, 367-377, 2006
672006
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
602010
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
592020
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
RA Shaikh, K Adi, L Logrippo
International Journal of Information Security 16 (1), 91–113, 2017
572017
Security and privacy for IoT and fog computing paradigm
A Rauf, RA Shaikh, A Shah
2018 15th Learning and Technology Conference (L&T), 96-101, 2018
502018
Validation of consistency and completeness of access control policy sets
RA Shaikh, K Adi, L Logrippo, S Mankovskii
US Patent 8,904,472, 2014
432014
A DDoS attack mitigation framework for IoT networks using fog computing
MA Lawal, RA Shaikh, SR Hassan
Procedia Computer Science 182, 13-20, 2021
392021
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
382020
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
362007
Securing distributed wireless sensor networks: Issues and guidelines
RA Shaikh, S Lee, YJ Song, Y Zhung
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
352006
A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks
MH Junejo, AAH Ab Rahman, RA Shaikh, K Mohamad Yusof, I Memon, ...
Scientific Programming 2020, 1-21, 2020
272020
Inconsistency detection method for access control policies
RA Shaikh, K Adi, L Logrippo, S Mankovski
Information Assurance and Security (IAS), 2010 Sixth International …, 2010
262010
Analysis and Comparison of Access Control Policies Validation Mechanisms
M Aqib, RA Shaikh
I. J. Computer Network and Information Security 7 (1), 54-69, 2015
252015
Imsi catcher detection method for cellular networks
H Alrashede, RA Shaikh
2019 2nd International Conference on Computer Applications & Information …, 2019
242019
Risk-based decision method for access control systems
RA Shaikh, K Adi, L Logrippo, S Mankovski
2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011
222011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20