Riaz Ahmed Shaikh

Orcid: 0000-0001-6666-0253

Affiliations:
  • King Abdulaziz University, Jeddah, Saudi Arabia
  • University of Québec, Canada (former)


According to our database1, Riaz Ahmed Shaikh authored at least 37 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks.
Multim. Tools Appl., February, 2024

2023
Trust Model for Reliable Grouping-Based Communications in Vehicular Ad-Hoc Networks.
IEEE Access, 2023

2022
Window Functions for Phasor Signal Processing of Wide-Area Measurement in Smart Grid Internet of Things Communications.
Proceedings of the IoT and WSN based Smart Cities: A Machine Learning Perspective, 2022

2021
A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability.
IEEE Access, 2021

2020
A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks.
Sci. Program., 2020

Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology.
Secur. Commun. Networks, 2020

A hybrid dual-mode trust management scheme for vehicular networks.
Int. J. Distributed Sens. Networks, 2020

Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks.
IEEE Access, 2020

2017
An analysis of fault detection strategies in wireless sensor networks.
J. Netw. Comput. Appl., 2017

A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets.
Int. J. Inf. Sec., 2017

2015
Critical applications in vehicular ad hoc/sensor networks.
Telecommun. Syst., 2015

Security Completeness Problem in Wireless Sensor Networks.
Intell. Autom. Soft Comput., 2015

2014
Intrusion-aware trust model for vehicular ad hoc networks.
Secur. Commun. Networks, 2014

2013
Trust Management Method for Vehicular Ad Hoc Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2012
Dynamic risk-based decision methods for access control systems.
Comput. Secur., 2012

2011
Risk-based decision method for access control systems.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

2010
Achieving Network Level Privacy in Wireless Sensor Networks.
Sensors, 2010

An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks.
J. Networks, 2010

Detecting incompleteness in access control policies using data classification schemes.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Inconsistency detection method for access control policies.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Sensors, 2009

Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
CoRR, 2009

Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Activity-Oriented Access Control for Ubiquitous Environments.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Image-Feature Based Human Identification Protocols on Limited Display Devices.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Activity-based Security Scheme for Ubiquitous Environments.
Proceedings of the 2008 IEEE International Performance, 2008

Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Network Level Privacy for Wireless Sensor Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Human Identification Through Image Evaluation Using Secret Predicates.
Proceedings of the Topics in Cryptology, 2007

2006
Securing Distributed Wireless Sensor Networks: Issues and Guidelines.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Trust Management Problem in Distributed Wireless Sensor Networks.
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006

Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network.
Proceedings of the Personal Wireless Communications, 2006

2005
Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...