Siraj Ahmed Shaikh

According to our database1, Siraj Ahmed Shaikh authored at least 57 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A New Architecture for Network Intrusion Detection and Prevention.
IEEE Access, 2019

A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Developing a QRNG ECU for Automotive Security: Experience of Testing in the Real-World.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Attack Defense Trees with Sequential Conjunction.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

Enabling Security Checking of Automotive ECUs with Formal CSP Models.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

2018
Building an automotive security assurance case using systematic security evaluations.
Comput. Secur., 2018

An Evidence Quality Assessment Model for Cyber Security Policymaking.
Proceedings of the Critical Infrastructure Protection XII, 2018

Using a one-class compound classifier to detect in-vehicle network attacks.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Fuzz Testing for Automotive Cyber-Security.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Towards a systematic security evaluation of the automotive Bluetooth interface.
Vehicular Communications, 2017

Towards a threat assessment framework for apps collusion.
Telecommunication Systems, 2017

Software Model Checking: A Promising Approach to Verify Mobile App Security.
CoRR, 2017

Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications.
Proceedings of the Information Security Theory and Practice, 2017

Towards a Testbed for Automotive Cybersecurity.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper.
Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs, 2017

Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Effective network security monitoring: from attribution to target-centric monitoring.
Telecommunication Systems, 2016

Combining Third Party Components Securely in Automotive Systems.
Proceedings of the Information Security Theory and Practice, 2016

Utilising $${\mathbb {K}}$$ Semantics for Collusion Detection in Android Applications.
Proceedings of the Critical Systems: Formal Methods and Automated Verification, 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

2015
Towards a knowledge-based approach for effective decision-making in railway safety.
J. Knowledge Management, 2015

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Comput. Electr. Eng., 2015

Early Warning Systems for Cyber Defence.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

A Model for Characterizing Cyberpower.
Proceedings of the Critical Infrastructure Protection IX, 2015

Towards an Early Warning System for Network Attacks Using Bayesian Inference.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Selected contributions from the Open Source Software Certification (OpenCert) workshops.
Sci. Comput. Program., 2014

2013
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise.
Information Systems Frontiers, 2013

Tracing Sources of Anonymous Slow Suspicious Activities.
Proceedings of the Network and System Security - 7th International Conference, 2013

Operating heavy duty vehicles under extreme heat conditions: A fuzzy approach for smart gear-shifting strategy.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Monitoring for Slow Suspicious Activities Using a Target Centric Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Autonomous Control in Military Logistics Vehicles: Trust and Safety Analysis.
Proceedings of the Engineering Psychology and Cognitive Ergonomics. Applications and Services, 2013

2012
Efficient and Reliable Transportation of Consignments (ERTOC).
IJAL, 2012

A Framework for Analysing Driver Interactions with Semi-Autonomous Vehicles
Proceedings of the Proceedings First International Workshop on Formal Techniques for Safety-Critical Systems, 2012

A Certification Process for Android Applications.
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012

Models of Knowledge Transfer for Sustainable Development.
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012

Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
Analysis of Collaboration Effectiveness and Individuals' Contribution in FLOSS Communities.
ECEASST, 2011

A Formal Approach to Analysing Knowledge Transfer Processes in Developing Countries.
Proceedings of the Software Engineering and Formal Methods - 9th International Conference, 2011

Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

2010
Characteristic trade-offs in designing large-scale biometric-based identity management systems.
J. Netw. Comput. Appl., 2010

Methodologies and Tools for OSS: Current State of the Practice.
ECEASST, 2010

Preface.
ECEASST, 2010

Certification of open-source software: A role for formal methods?
Comput. Syst. Sci. Eng., 2010

ICT Driven Knowledge Management in Developing Countries: A Case Study in a Chinese Organisation.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

Optimising IDS Sensor Placement.
Proceedings of the ARES 2010, 2010

2009
Towards a metric for Open Source Software Quality.
ECEASST, 2009

Specifying authentication using signal events in CSP.
Comput. Secur., 2009

A Deployment Value Model for Intrusion Detection Sensors.
Proceedings of the Advances in Information Security and Assurance, 2009

A Multi-objective Optimisation Approach to IDS Sensor Placement.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2007
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions.
I. J. Network Security, 2007

2006
Analysing the Woo-Lam Protocol Using CSP and Rank Functions.
Journal of Research and Practice in Information Technology, 2006

Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

2004
Analysis and implementation of virtual private network support in corporate networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

2002
A Study of Encrypted, Tunneling Models in Virtual Private Networks.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Performance of Multimedia Applications with IPSec Tunneling.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

2001
Virtual Private Network Support in a Corporate Network.
Proceedings of WebNet 2001, 2001


  Loading...