Siraj Ahmed Shaikh

Orcid: 0000-0002-0726-3319

According to our database1, Siraj Ahmed Shaikh authored at least 75 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Predicting Next Useful Location With Context-Awareness: The State-Of-The-Art.
CoRR, 2024

2023
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons.
Trans. Emerg. Telecommun. Technol., November, 2023

Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception.
J. Cybersecur., January, 2023

Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges.
Sensors, 2023

A formal framework for security testing of automotive over-the-air update systems.
J. Log. Algebraic Methods Program., 2023

Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis.
Inf., 2023

2022
Formal Methods for Software Engineering - Languages, Methods, Application Domains
Texts in Theoretical Computer Science. An EATCS Series, Springer, ISBN: 978-3-030-38799-0, 2022

Systematic threat assessment and security testing of automotive over-the-air (OTA) updates.
Veh. Commun., 2022

Drivers and barriers for secure hardware adoption across ecosystem stakeholders.
J. Cybersecur., 2022

A Hardware-based SoC Monitoring In-life Solution for Automotive Industry.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Safety, Stability and Environmental Impact of FDI Attacks on Vehicular Platoons.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
Using internal context to detect automotive controller area network attacks.
Comput. Electr. Eng., 2021

A Real-Time In-Vehicle Network Testbed for Machine Learning-Based IDS Training and Validation.
Proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st SGAI International Conference on Artificial Intelligence (SGAI 2021), 2021

Formalising UPTANE in CSP for Security Testing.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Vehicular Platoon Communication: Cybersecurity Threats and Open Challenges.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
A Model-Based Security Testing Approach for Automotive Over-The-Air Updates.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Games for Cybersecurity Decision-Making.
Proceedings of the HCI in Games, 2020

2019
A New Architecture for Network Intrusion Detection and Prevention.
IEEE Access, 2019

A Template-Based Method for the Generation of Attack Trees.
Proceedings of the Information Security Theory and Practice, 2019

A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Developing a QRNG ECU for Automotive Security: Experience of Testing in the Real-World.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Attack Defense Trees with Sequential Conjunction.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

Enabling Security Checking of Automotive ECUs with Formal CSP Models.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

2018
Building an automotive security assurance case using systematic security evaluations.
Comput. Secur., 2018

An Evidence Quality Assessment Model for Cyber Security Policymaking.
Proceedings of the Critical Infrastructure Protection XII, 2018

Using a one-class compound classifier to detect in-vehicle network attacks.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Fuzz Testing for Automotive Cyber-Security.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Towards a systematic security evaluation of the automotive Bluetooth interface.
Veh. Commun., 2017

Towards a threat assessment framework for apps collusion.
Telecommun. Syst., 2017

Software Model Checking: A Promising Approach to Verify Mobile App Security.
CoRR, 2017

Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications.
Proceedings of the Information Security Theory and Practice, 2017

Towards a Testbed for Automotive Cybersecurity.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper.
Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs, 2017

Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Effective network security monitoring: from attribution to target-centric monitoring.
Telecommun. Syst., 2016

Combining Third Party Components Securely in Automotive Systems.
Proceedings of the Information Security Theory and Practice, 2016

Utilising $${\mathbb {K}}$$ Semantics for Collusion Detection in Android Applications.
Proceedings of the Critical Systems: Formal Methods and Automated Verification, 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

2015
Towards a knowledge-based approach for effective decision-making in railway safety.
J. Knowl. Manag., 2015

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Comput. Electr. Eng., 2015

Early Warning Systems for Cyber Defence.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

A Model for Characterizing Cyberpower.
Proceedings of the Critical Infrastructure Protection IX, 2015

Towards an Early Warning System for Network Attacks Using Bayesian Inference.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Selected contributions from the Open Source Software Certification (OpenCert) workshops.
Sci. Comput. Program., 2014

2013
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise.
Inf. Syst. Frontiers, 2013

Tracing Sources of Anonymous Slow Suspicious Activities.
Proceedings of the Network and System Security - 7th International Conference, 2013

Operating heavy duty vehicles under extreme heat conditions: A fuzzy approach for smart gear-shifting strategy.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Monitoring for Slow Suspicious Activities Using a Target Centric Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Autonomous Control in Military Logistics Vehicles: Trust and Safety Analysis.
Proceedings of the Engineering Psychology and Cognitive Ergonomics. Applications and Services, 2013

2012
Efficient and Reliable Transportation of Consignments (ERTOC).
Int. J. Appl. Logist., 2012

A Framework for Analysing Driver Interactions with Semi-Autonomous Vehicles
Proceedings of the Proceedings First International Workshop on Formal Techniques for Safety-Critical Systems, 2012

A Certification Process for Android Applications.
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012

Models of Knowledge Transfer for Sustainable Development.
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012

Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
Analysis of Collaboration Effectiveness and Individuals' Contribution in FLOSS Communities.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

A Formal Approach to Analysing Knowledge Transfer Processes in Developing Countries.
Proceedings of the Software Engineering and Formal Methods - 9th International Conference, 2011

Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

2010
Characteristic trade-offs in designing large-scale biometric-based identity management systems.
J. Netw. Comput. Appl., 2010

Methodologies and Tools for OSS: Current State of the Practice.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

Preface.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

Certification of open-source software: A role for formal methods?
Comput. Syst. Sci. Eng., 2010

ICT Driven Knowledge Management in Developing Countries: A Case Study in a Chinese Organisation.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

Optimising IDS Sensor Placement.
Proceedings of the ARES 2010, 2010

2009
Towards a metric for Open Source Software Quality.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Specifying authentication using signal events in CSP.
Comput. Secur., 2009

A Deployment Value Model for Intrusion Detection Sensors.
Proceedings of the Advances in Information Security and Assurance, 2009

A Multi-objective Optimisation Approach to IDS Sensor Placement.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2007
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions.
Int. J. Netw. Secur., 2007

2006
Analysing the Woo-Lam Protocol Using CSP and Rank Functions.
J. Res. Pract. Inf. Technol., 2006

Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

2004
Analysis and implementation of virtual private network support in corporate networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

2002
A Study of Encrypted, Tunneling Models in Virtual Private Networks.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Performance of Multimedia Applications with IPSec Tunneling.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

2001
Virtual Private Network Support in a Corporate Network.
Proceedings of WebNet 2001, 2001


  Loading...