Amar A. Rasheed

Orcid: 0000-0002-1929-9124

According to our database1, Amar A. Rasheed authored at least 33 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.
Sensors, February, 2024

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network.
IEEE Trans. Netw. Sci. Eng., 2024

A Robust Physical Layer IDS for Intra-Vehicle Communication Security.
Proceedings of the International Conference on Smart Applications, 2024

Mobile Forensic Investigation: Extractions and Connectivity Isolation in Phones Utilizing eSIM, iSIM Technology.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Persistent Browser Storage Data Extractor.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

2023
CANAttack: Assessing Vulnerabilities within Controller Area Network.
Sensors, October, 2023

Highly Reliable Robust Mining of Educational Data Features in Universities Based on Dynamic Semantic Memory Networks.
Mob. Networks Appl., October, 2023

DPark: Decentralized Smart Private-Parking System using Blockchains.
J. Grid Comput., September, 2023

A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions.
Inf., 2023

Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms.
Proceedings of the 26th International Symposium on Wireless Personal Multimedia Communications, 2023

A Lite-SVM Based Semantic Search Model for Bigdata Analytics in Smart Cities.
Proceedings of the 26th International Symposium on Wireless Personal Multimedia Communications, 2023

A Testbed for LoRa Wireless Communication between IoT devices.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

A Testbed for a Controller Area Network Communication Protocol in Automobiles.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT.
IEEE Trans. Emerg. Top. Comput., 2022

Privacy-preserving Blockchain-assisted private-parking scheme with efficient matching.
Comput. Electr. Eng., 2022

Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

2021
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

Clock Gating-Assisted Malware (CGAM): Leveraging Clock Gating On ARM Cortex M<sup>*</sup> For Attacking Subsystems Availability.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

On the Assessment of Robustness of Telemedicine Applications against Adversarial Machine Learning Attacks.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

A Blockchain-Based Energy Trading Scheme for Electric Vehicles.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2020

2019
Adaptive Group-based Zero Knowledge Proof-Authentication Protocol (AGZKP-AP) in Vehicular Ad Hoc Networks.
CoRR, 2019

Configurable Anonymous Authentication Schemes For The Internet of Things (IoT).
Proceedings of the IEEE International Conference on RFID, 2019

2018
Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT Devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
A trusted computing architecture for health care.
Proceedings of the 2017 International Conference on Information Networking, 2017

Private matching and set intersection computation in multi-agent and industrial control systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2016
Dynamically reconfigurable AES cryptographic core for small, power limited mobile sensors.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

2012
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks.
IEEE Trans. Parallel Distributed Syst., 2012

2011
Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011

2009
A key pre-distribution scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

2008
Secure Data Collection Scheme in Wireless Sensor Network with Mobile Sink.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008


  Loading...