Fariha Tasmin Jaigirdar

Orcid: 0000-0003-1119-6056

According to our database1, Fariha Tasmin Jaigirdar authored at least 12 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security-Aware Provenance for Transparency in IoT Data Propagation.
IEEE Access, 2023

Are We Missing the Cybersecurity Factors in Recordkeeping?
Proceedings of the Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, 2023

2022
NOTE: Unavoidable Service to Unnoticeable Risks: A Study on How Healthcare Record Management Opens the Doors of Unnoticeable Vulnerabilities for Rohingya Refugees.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

2021
Provenance for Secure Propagation of IoT Data.
PhD thesis, 2021

Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach.
Proceedings of the IEEE International Conference on Digital Health, 2021

2020
Prov-IoT: A Security-Aware IoT Provenance Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

What Information is Required for Explainable AI? : A Provenance-based Research Agenda and Future Challenges.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2018
Trust based Security Solution for Internet of Things Healthcare Solution: An End-to-End Trustworthy Architecture.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

2016
A new cost-effective approach for battlefield surveillance in wireless sensor networks.
Proceedings of the International Conference on Networking Systems and Security, 2016

2012
Assurance of the Maximum Destruction in Battlefield using Cost-Effective Approximation Techniques.
J. Networks, 2012

2011
Simulation and Performance Analysis of Adaptive Filtering Algorithms in Noise Cancellation
CoRR, 2011


  Loading...