Riaz Ahmed Shaikh
Riaz Ahmed Shaikh
Associate Professor, School of Computing Sciences, University of East Anglia, UK
Подтвержден адрес электронной почты в домене uea.ac.uk - Главная страница
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2009
An analysis of fault detection strategies in wireless sensor networks
T Muhammed, RA Shaikh
Journal of Network and Computer Applications 78, 267-287, 2017
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
Intrusion‐aware trust model for vehicular ad hoc networks
RA Shaikh, AS Alzahrani
Security and Communication Networks 7 (11), 1652-1669, 2014
Dynamic risk-based decision methods for access control systems
RA Shaikh, K Adi, L Logrippo
Computers & Security 31 (4), 447-464, 2012
LSec: lightweight security protocol for distributed wireless sensor network
RA Shaikh, S Lee, MAU Khan, YJ Song
IFIP International Conference on Personal Wireless Communications, 367-377, 2006
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
RA Shaikh, K Adi, L Logrippo
International Journal of Information Security 16 (1), 91–113, 2017
Security and privacy for IoT and fog computing paradigm
A Rauf, RA Shaikh, A Shah
2018 15th Learning and Technology Conference (L&T), 96-101, 2018
Validation of consistency and completeness of access control policy sets
RA Shaikh, K Adi, L Logrippo, S Mankovskii
US Patent 8,904,472, 2014
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
Securing distributed wireless sensor networks: Issues and guidelines
RA Shaikh, S Lee, YJ Song, Y Zhung
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
A DDoS attack mitigation framework for IoT networks using fog computing
MA Lawal, RA Shaikh, SR Hassan
Procedia Computer Science 182, 13-20, 2021
A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks
MH Junejo, AAH Ab Rahman, RA Shaikh, K Mohamad Yusof, I Memon, ...
Scientific Programming 2020, 1-21, 2020
Inconsistency detection method for access control policies
RA Shaikh, K Adi, L Logrippo, S Mankovski
Information Assurance and Security (IAS), 2010 Sixth International …, 2010
Analysis and Comparison of Access Control Policies Validation Mechanisms
M Aqib, RA Shaikh
I. J. Computer Network and Information Security 7 (1), 54-69, 2015
Risk-based decision method for access control systems
RA Shaikh, K Adi, L Logrippo, S Mankovski
2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011
A trust-based approach to control privacy exposure in ubiquitous computing environments
PD Giang, LX Hung, RA Shaikh, Y Zhung, S Lee, YK Lee, H Lee
IEEE International Conference on Pervasive Services, 149-152, 2007
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20