Syed Naqvi

According to our database1, Syed Naqvi authored at least 33 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
An Energy Efficient Framework for UAV-Assisted Millimeter Wave 5G Heterogeneous Cellular Networks.
IEEE Trans. Green Commun. Netw., 2019

Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems.
Proceedings of the 13th International Symposium on Medical Information and Communication Technology, 2019

Towards Fully Integrated Real-time Detection Framework for Online Contents Analysis - RED-Alert Approach.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

A Research-Led Practice-Driven Digital Forensic Curriculum to Train Next Generation of Cyber Firefighters.
Proceedings of the IEEE Global Engineering Education Conference, 2019

A Framework of New Hybrid Features for Intelligent Detection of Zero Hour Phishing Websites.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

2018
Energy Efficiency Analysis of UAV-Assisted mmWave HetNets.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Aggregation of security metrics for decision making: a reference architecture.
Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, 2018

Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2016
Learning Feature Selection and Combination Strategies for Generic Salient Object Detection.
PhD thesis, 2016

2012
Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

2010
RESERVOIR - A European Cloud Computing Project.
ERCIM News, 2010

Applying Digital Forensics in the Future Internet Enterprise Systems - European SME's Perspective.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Scalable Cloud Defenses for Detection, Analysis and Mitigation of DDoS Attacks.
Proceedings of the Towards the Future Internet - Emerging Trends from European Research, 2010

Protecting corporate ICT infrastructures by using digital forensics.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region's eHealth Platform.
Proceedings of the Privacy and Identity Management for Life, 2009

Providing security for MOCCA component environment.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Security and Trust Management for Virtual Organisations: GridTrust Approach.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures.
Proceedings of the Cloud Computing - First International Conference, 2009

2008
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids.
Int. J. Inf. Secur. Priv., 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

2007
Threat Analysis and Attacks on XtreemOS: a Grid-enabled Operating System.
Proceedings of the Towards Next Generation Grids, 2007

2006
Scope of Forensics in Grid Computing - Vision and Perspectives.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Security Requirements Analysis for Large-Scale Distributed File Systems.
Proceedings of the Euro-Par 2006 Workshops: Parallel Processing, 2006

Security Requirements Model for Grid Data Management Systems.
Proceedings of the Critical Information Infrastructures Security, 2006

Deriving Policies from Grid Security Requirements Model.
Proceedings of the Achievements in European Research on Grid Systems: CoreGRID Integration Workshop 2006, 2006

2005
Security and trust assurances for smart environments.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Securing Grid-Based Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2005

Threat Model for Grid Security Services.
Proceedings of the Advances in Grid Computing, 2005

Grid Security Services Simulator (G3S) - A Simulation Tool for the Design and Analysis of Grid Security Solutions.
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005

Dynamic Access Control for Pervasive Grid Applications.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004


  Loading...